CN109844728A - Arranging system based on user information migrated users data and service - Google Patents
Arranging system based on user information migrated users data and service Download PDFInfo
- Publication number
- CN109844728A CN109844728A CN201780062108.5A CN201780062108A CN109844728A CN 109844728 A CN109844728 A CN 109844728A CN 201780062108 A CN201780062108 A CN 201780062108A CN 109844728 A CN109844728 A CN 109844728A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- node
- mist
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/823—Prediction of resource usage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/11—File system administration, e.g. details of archiving or snapshots
- G06F16/119—Details of migration of file systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/80—Actions related to the user profile or the type of traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/83—Admission control; Resource allocation based on usage prediction
Abstract
For system, method and the computer-readable medium of layout to be carried out to the access of data to data center resource and user.In some instances, a kind of system can determine the data that user will need to store at the access first position of the second position in the second time in first time.The system can identify being capable of storing data and the node that can be accessed by equipment from the second position.The system can also determine first service parameter associated with the network connection between equipment and first position, second service parameter associated with the network connection between equipment and node.When second service parameter has than first service parameter higher quality, which can move to node from first position for data, and equipment is allowed to access data from the second position by node.
Description
Technical field
This technology is related to cloud and data center's layout (orchestration) system, more particularly relates to based on use
Family information and context intelligently migrate network data between geographic area and network layer and the data center of network access point compiles
Heat-extraction system and predictive scheduling and positioning system integrate.
Background technique
Due to globalization, travelling and mobilization have become very common business component.Employee in company labour must
It must be for commercial object continually shift position.Meanwhile employee generally requires network data that is reliable and rapidly accessing them
To complete their task and commercial object.The multiple positions of large-scale global organization usually in the world have in data
The heart and network access point.User on road generally can choose by being geographically connected to group close to their access point
The network knitted.But the position of user data will be constant: user data by still trustship user home site.Unfortunate
It is that remote data access will increase significant delay and delay, so as to cause loss in productivity.
Sometimes, user may be coupled to the remote computing resource close to user data (for example, local unix host or long-range
Desktop client end).But this method needs longer two-way time, this will also generate significant delay.In addition, access
Data on remote server also need additionally to share network capacity, and have additional security risk.Therefore, for long-range
The Current protocols of data access have significant performance, safety and cost limitation.
Detailed description of the invention
In order to describe the available disclosure above and other advantages and features mode, will be shown by reference attached drawing
Specific embodiment is presented being discussed in greater detail to principle described briefly above.It should be understood that these attached drawings are only described
The exemplary embodiment of the disclosure, therefore should not be considered as the limitation to the scope of the present disclosure.More by using attached drawing
Principle that is detailed and being specifically described and illustrate this paper, in which:
Figure 1A shows example cloud computing framework;
Figure 1B shows example mist computing architecture;
Fig. 2 shows the schematic diagrames of example network framework;
Fig. 3 A show for based on user's context and information in different time the migrating data between system or position
Example arranging system schematic diagram;
Fig. 3 B to 3E shows the mobile cloud system of example geo location aware;
Fig. 4 shows exemplary method;
Fig. 5 shows example network device according to various embodiments;And
Fig. 6 A and Fig. 6 B show exemplary system embodiment.
Specific embodiment
The various embodiments of the disclosure are discussed further below.When discussing specific embodiment, it should be understood that in this way
It does merely for illustrative purpose.One skilled in the relevant art will recognize that in the condition without departing from spirit and scope of the present disclosure
Under, other assemblies and configuration can be used.
It summarizes
Independent claims give many aspects of the invention, and dependent claims give preferred feature.One side
The feature in face can be applied to each aspect with being combined individually or with other aspects.
Following description will provide the supplementary features and advantage of the disclosure, these supplementary features and advantage can pass through implementation
Principle acquistion disclosed herein will be apparent partly according to this description.By being particularly pointed out in appended claims
Combination and equipment, may be implemented and obtain the feature and advantage of the disclosure.These and other features of the disclosure will be from following
Description and appended claims become to be more completely clear, or can pass through and implement principle acquistion given herein.
As previously mentioned, remote data access can add significant delay and delay, to will lead to higher cost
And loss in productivity.In addition, remote data access needs additional Internet resources or capacity and will cause additional safety wind
Danger.Method given herein can be by that will dispatch the stroke or it is expected that (anticipate) cloud or net of cloud or networking client
The system integration of the movement of network client into data center's layout, to provide always to the user being traveling at for data and
The local IP access of other Internet resources, to eliminate or reduce these problems.
Method given herein may provide for such as application, VM, container data and service and data itself etc
Data center resource geographical location optimization access.Can integrate various systems so that the mobile seamless connection of resource and
It is consistent with the light load time of the downtime (down time) of user or network.For example, can be by the transmission and intelligence of connection
Communication tool system and arranging system are integrated, to provide the local IP access for data (even if on the way).This can be by disappearing
Except access resource improves productivity with delay when servicing.Which (a little) mist node is methods herein can identify and be in expectation
In the service range of user location, and the user be would be possible into the context needed before each user reaches and preloaded
Onto (one or more) the mist node identified.Various strategies herein may provide for the support of machine learning, with
Optimize data duplication.In addition, methods herein can support the high velocity environment with frequent switching, for example, high-speed railway, superelevation
Iron, UAV network and the LEO satellite constellation with large-scale ground station network.In IoT network, some such data can be with
In real time critical control system, within the system, local data access is extremely important for meeting the delay target of system.
Disclose for based on user prediction context and geographical location come marshal data center resources and manage user
To the system, method and computer readable storage medium of the access of data.In some instances, system can determine that user will
The data of trustship at the homing position from remote location access on network are needed in future time.System can then be identified and be stayed
One or more network nodes in geographic area and/or near remote location in region (proximity) are stayed in, and will
At least part of the data of trustship moves to the one or more network node at homing position.The system may also help in
User is from remote location access data.
Description
Disclosed technology solves in the art for reducing delay associated with remote data access, prolonging
When and security risk mechanism demand.This technology is related to for efficiently and effectively layout Internet resources and data access,
It can to provide the local IP access of system, method and computer to(for) data and Internet resources always to the user being traveling at
Read medium.
It is disclosed first herein to such as Figure 1A, Figure 1B and the network shown in Fig. 2 for accessing and servicing for network data
The description of environment and framework.The mechanism as shown in Fig. 3 to Fig. 4 for the access of layout network data is discussed below.This is begged for
By then being terminated with the brief description to the example apparatus as shown in Fig. 5 and Fig. 6 A-B.Various implementations should be described herein
These deformations that example can provide.The disclosure is turning now to Figure 1A.
Figure 1A shows the schematic diagram of example cloud computing framework 100.The framework may include cloud 102.Cloud 102 may include
One or more private clounds, public cloud, and/or mixed cloud.In addition, cloud 102 may include cloud element 104-114.Cloud element
104-114 may include for example, server 104, virtual machine (VM) 106, one or more software platforms 108, application or service
110, software container 112 and infrastructure node 114.Infrastructure node 114 may include various types of nodes, example
Such as, calculate node, memory node, network node, management system etc..
Cloud 102 can provide various cloud computing services via cloud element 104-114, for example, software services (SaaS) (example
Such as, collaboration services, E-mail service, Enterprise Resources Plan service, content service, communication service etc.), infrastructure i.e. service
(IaaS) (for example, secure network, the Internet services, system administration services etc.), platform i.e. service (PaaS) (for example, web services,
Streaming service, application and development service etc.) and it is other kinds of service (for example, desktop i.e. service (DaaS), information technology
Management i.e. service (ITaaS), management software service (MSaaS), mobile rear end services (MBaaS) etc..
Client endpoint 116 can be connect with cloud 102, to obtain one or more special services from cloud 102.Client end
Point 116 can be via one or more public networks (for example, internet), private network, and/or hybrid network (for example, virtual
Private network) it is communicated with element 104-114.Client endpoint 116 may include any equipment with networked capabilities, for example,
Laptop computer, tablet computer, server, desktop computer, smart phone, the network equipment are (for example, access point, road
By device, interchanger etc.), smart television, intelligent automobile, sensor, GPS device, game system, the wearable object of intelligence (for example,
Smartwatch etc.), consumer objects (for example, Internet refrigerator, Intelligent light system etc.), city or transportation system be (for example, flow
Control, charging system etc.), Internet of Things (IoT) equipment, camera, the network printer, transportation system is (for example, aircraft, train, motor-driven
Vehicle, ship etc.) or any intelligence or connecting object (for example, wired home, intelligent building, intelligence retail, intelligent glasses etc.)
Deng.
Figure 1B shows the schematic diagram of example mist computing architecture 150.Mist computing architecture 150 may include cloud layer 154 and mist
Layer 156, wherein cloud layer 154 includes cloud 102 and any other cloud system or environment, and mist layer 156 includes mist node 162.Client
Endpoint 116 can be communicated with cloud layer 154 and/or mist layer 156.Framework 150 may include cloud layer 154, mist layer 156 and client
Hold one or more communication links 152 between endpoint 116.Communication can flow upward to cloud layer 154 and/or flow downwardly into client
Hold endpoint 116.
Mist layer 156 or " mist " provide calculating, storage and the network savvy of traditional cloud network, but than traditional cloud network
Closer to endpoint.Therefore, cloud 102 can be expanded to the position closer to client endpoint 116 by mist.Mist node 162 can be
The physical embodiments of mist network.In addition, mist node 162 can provide local or regional service, and/or provides and arrive client end
The connectivity of point 116.Therefore, flow and/or data can be discharged into mist layer 156 (for example, via mist node from cloud 102
162).Therefore, mist layer 156 can provide service and/or connectivity faster to client endpoint 116, have lower delay
And other advantages are (for example, it is excellent to have benefited from the safety saved the data in inside (one or more) local or Local Area Network
Point).
Mist node 162 may include networked computing device, for example, server, interchanger, router, controller, camera,
Access point, gateway etc..In addition, mist node 162 can be deployed in from anywhere in having network connection, for example, factory, electric wire
Bar, along rail, in the car, on oil rig, in airport, aboard, at the mall in, within the hospital,
In park, in parking lot, it is medium in library.
In some configurations, one or more mist nodes 162 can be deployed in mist example 158,160.Mist example 158,
158 can be local or region cloud or network.For example, mist example 156,158 can be region cloud or data center, local area network,
The network etc. of mist node 162.In some configurations, one or more mist nodes 162 can be disposed in a network, for example, conduct
Independence or separate nodes.In addition, including for example, in various topologys including star-like, annular, grid or hierarchical arrangement, mist section
One or more of point 162 can be interconnected amongst one another via link 164.
In some cases, one or more mist nodes 162 can be mobile mist node.Mobile mist node can be moved to
Different geographical location, logical place or networks, and/or mist example, while keeping the connection with cloud layer 154 and/or endpoint 116
Property.For example, specific mist node can be placed on can advance to another geographical position from a geographical location and/or logical place
Set and/or the vehicles of logical place (for example, aircraft or train) in.In this example, specific mist node can be located at
It is connected to the specific physically and/or logically tie point with cloud 154 while initial position, and destination position can be located at
The different physically and/or logically tie points from cloud 154 are switched to while setting.Therefore, specific mist node can be in particular cloud
And/or moved in mist example, therefore can different time from different location be endpoint service.
Fig. 2 shows the schematic block diagrams of example network framework 200.In some cases, framework 200 may include in data
The heart, which can support and/or trustship cloud 102.In addition, framework 200 includes network structure 212, network structure tool
Have the leaf interchanger 204A, 204B being connected in network structure 212,204C ..., the backbone of 204N (be referred to as " 204 ")
(spine) interchanger 202A, 202B ..., 202N (be referred to as " 202 ").
Backbone switch 202 can be layer 3 (L3) interchanger in structure 212.But in some cases, backbone is handed over
Changing planes 202 can also be with execution level 2 (L2) function.Backbone switch 202 is connected to the leaf interchanger 204 in structure 212.Leaf exchange
Machine 204 may include access interface (or non-fiber port) and fiber port.Fiber port can be provided to backbone switch 202
Uplink, while access interface can to equipment, host, endpoint, VM or external network provide to structure 212 connection
Property.
Leaf interchanger 204 may reside within the boundary between structure 212 and tenant or client space.In some cases
In, leaf interchanger 204 can be frame top formula (" ToR ") interchanger, aggregation switch, row end (end-of-row, EoR) exchange
Machine, in the ranks (middle-of-row, MoR) interchanger etc..
Leaf interchanger 204 can be responsible for routing and/or bridging tenant's grouping and application network strategy.In some cases,
Leaf interchanger can execute one or more additional functions, for example, realizing mapped cache, when there are miss (miss) in caching
When to agent functionality send grouping, encapsulating packets, execution entrance or egress policy etc..
In addition, leaf interchanger 204 may include virtual switch and/or tunnelling function, for example, virtual channel endpoint (VTEP)
Function.Therefore, structure 212 can be connected to overlay network (for example, VXLAN network) by leaf interchanger 204.
Network connectivty in structure 212 can flow through leaf interchanger 204.Leaf interchanger 204 can be to server, money
Source, endpoint, external network or VM provide the access to structure 212, and leaf interchanger 204 can be connected to each other.Some
In situation, endpoint groups (EPG) can be connected to structure 212 and/or any external network by leaf interchanger 204.Each EPG can
Via for example, one or more of leaf interchanger 204 is connected to structure 212.
Endpoint 210A-E (being referred to as " 210 ") can be connected to structure 212 via leaf interchanger 204.For example, endpoint 210A and
210B can be directly connected to leaf interchanger 204A, and endpoint 210A and 210B can be connected to structure 212 by leaf interchanger 204A
And/or any other leaf interchanger 204.Similarly, endpoint 210E can be directly connected to leaf interchanger 204C, leaf interchanger
Endpoint 210E can be connected to structure 212 and/or any other leaf interchanger 204 by 204C.On the other hand, endpoint 210C and
210D can be connected to leaf interchanger 204A and 204B via network 206.In addition, wide area network (WAN) 208 may be coupled to leaf friendship
Change planes 204N.
Endpoint 210 may include any communication equipment, for example, computer, server, interchanger etc..In some cases,
Endpoint 210 may include server or interchanger configured with virtual channel endpoint functionality, and the server or interchanger will cover
Network is connect with structure 212.For example, in some cases, endpoint 210 can be indicated with virtual channel end-point capability and be transported
The host (for example, server) of row virtual environment (for example, management program, (one or more) virtual machine, container etc.).With endpoint
210 associated overlay networks can be with trustship physical equipment, for example, server;Using;EPG;Virtual segmentation;Virtual work is negative
Lotus;Deng.Equally, endpoint 210 can be with trustship virtual work load and application, these workloads and application can be with structures
212 or any other equipment or network (including external network) connection.
Example network environment and structure has been disclosed, the disclosure is visited turning now to according to the network data of various methods
The general introduction for the layout asked.
Generally, when user advances to another website from a website, can carry out to a certain degree plan (even if this
The plan of sample is at the last moment).For example, some form of transport can be subscribed, hotel can be carried out and made a reservation for, supper can be carried out
It arranges, meeting can be arranged, preparation process can be executed, navigation software can be entered a destination into using medium.If will
The system integration for predetermined stroke can then make data center perception specific user when will into data center's arranging system
Traveling and user will go to where.User can be tied to the data and other resources that user generally uses by arranging system
(for example, application).When (that is, when user is physically moved to another position from a position) user's traveling, layout system
Data can be reoriented to the remote site closest to the destination of user (for example, Cloud Server, mist from its current site by system
Node, LAN server etc.), wherein the current site can be " home base station " for example on geographical location close to user
Website.Therefore, when user reaches, user can access phase from the data center for more closely snapping to user current location
Same data and resource.This can improve performance, efficiency, safety, cost etc..
Therefore, it is possible to use stroke planning data carrys out the movement of anticipating user and helps to mitigate network (for example, cloud-cloud
Network) on load.Can also use there are system confirmation users to arrive at the destination, and signal system and make new position
It comes into force.In some instances, data can be organized in container, which can be moved to destination node and just
When user reaches, starting (spin up) is got up.
In some cases, not necessarily mobile data.For example, can be with replicate data, and then change can be collected multiple
" home base station " position is made go back to update original copy (master copy).In the case where application or VM (virtual machine), it can will provide
Subject string links up and moves them into the calculate node closer to the new position of user.Depending on data center architecture, one
In a little configurations, identical address access VM or application can be used, this makes processing transparent for terminal user.
When user is scheduled proceeds back to " home base station " position, arranging system data relocation can be gone back or
Simply destroy interim scapegoat or copy.When user advances more and more with the time, which can be from traveling mould
Formula study, and teledata copy is maintained in particular station.For example, if user regularly New York and San Jose it
Between advance, then the snapshot of data copy and VM can be maintained in two websites, only come copies back change collection.When user is more
When being moved between a position, master data set can be changed into and be directed toward the position that user is currently located.Advance return when, can be with
Mobile owner pointer.Final result is the optimization access for generic resource.
As indicated above, system and stroke planning system can will be present and determine related data is hosted in where
Data center's arranging system integrates.In addition, it is not necessary that simply paying close attention to end-to-end position.Size depending on data set
The time spent with user in specific position, data duplication/movement can carry out in middle position.For example, if user will be
It advances between New York and Bangalore, then the user may have stopping over for extension in London.During in London, data
It may reside within European data center, for quickly being had secure access to from airport.When user continues to go to the trip of Bangalore
Row, then can again repeat or mobile data.
Other than stroke intended application, a lot of other mechanism can be used to predict when specific user will be in specific mist
In the opereating specification of node or cloud node.For example, can be with the social media of counsel user, to check whether to mention any stroke
It is single.The reservation systems such as course line, railway, taxi, restaurant, hotel, which can be generated, is pre-charged with request, it might even be possible to by they with
Such as the specific address of mobile mist node or neighbouring enterprise's mist node on the vehicles of seating is associated by user.If
User advances just on line style route (for example, on interstate highway, railway line, river etc.), then the system can perceive landform,
Topology, speed etc., and can predict the expected approach time at mist node along route.Navigation system (for example, with
The smart phone at family or they take the vehicles in) can also with the system integration, with obtain user input any mesh
Ground and navigation and position data.
The transportation system of connection and intelligent transportation tool can also be implemented to obtain the traveling of user and scheduling data.
A this example mobile including superelevation iron and pole dynamic data is described below.Another showing with the movement of more static datas
Example can be about air travel.When passenger's registration, the application on phone can detecte registering events, and data can
Be copied to people by multiply go by air or airport on storage inside facility.When aircraft front door wait when (for example, plus
Oil, loading etc.), data can be sent to aircraft via high speed connection.It by cipher mode storing data and can be put
It sets in the addressable logic container of user.Aircraft subsequently becomes the mist extension of cloud (it can be public or privately owned).When
User's aboard and when being scanned into, information can be sent to aircraft and cloud service, so that data pointer is during flight
It is solidified.If user could not aboard, aircraft can destroy the local replica of data.When user will visit on the way in flight
When asking data, user can be pellucidly redirected to local data by cloud service.This can significantly affect productivity.
Thinner granularity can also be even used in the very high performance system with large data sets.Consider to take high
Fast train or superelevation iron carry out the user of travel abroad (24 users are advanced in pipeline (pipe) with the rate of 1000Kph).
WiFi or optical transceiver in pipe (tube) keep the vehicles to support net connection with ground always.Pipe it is every
2km has a mist node to manage the segmentation of pipe, and access point is driven to service the track 1Km in each direction.AP (access
Point) and mist node between switching can carry out within every 7 seconds in the case where these speed it is primary.In order to keep continuously being connected to
Property, continuous service is provided for all vehicle functioies and spreads UHD entertainment from cloud and is defeated by each passenger, can be with
Be pre-charged with such data to all mist nodes along travelling route: the vehicles are it is anticipated that itself arrived is somebody's turn to do once reaching
The data of node itself and passenger's needs.If the superelevation iron vehicles are in the range of given mist node only such as 7 seconds,
It can be then wasted due to combinatorial delays more than user-cloud data transmission window mouth of half.On the contrary, if we know that user what
When will in the range in given mist node (even if prior notice only 10 seconds), then we can be pre-configured with it may be desired to
Each information, and entire 7 seconds windows when user is in the range can be used in internet communication.
Similar concept can be applied to the LEO constellation for being designed to the satellite of low transmission delay operation.It depends on
The specific design and number of earth station, each satellite may undergo primary switching per minute, and in next estimated earth
The place of station, which is pre-charged with data source, can be improved network throughput.
The delay of cloud can be substantially reduced by being pre-charged with data in local mist node.It is serious that certain applications can be delay
's.For example, networking tactile (wherein, user has the touch feedback from network-based application) can have urgent delay
It is required that.If this apply in cloud, round trip delay time may be hundreds of milliseconds in some cases, but the illusion touched is usual
1 millisecond of delay can be exceeded to destroy.Mist technology is remarkably contributing to this scene.Similarly, outer in Telemedicine or remotely
In section's application, driving the anatomical data collection of haptic interface can be in size number terabyte, and in patient and sound institute
Mist node on be pre-charged with them and will save the quality time.
In addition, the future user locations as described herein based on countless data sources can be by cognitive system with the time
Past " acquistion ", so that intelligence and the correlation of active, prediction etc. can be performed, to improve accuracy and automatically in advance
Fill data source.For example, if the user being traveling at is in their streamed video during the journey, the corpus of various data sources
Library (for example, aircraft, train, automobile, cartographic information, the geographical location GPS/, NETFLIX user's program preferences etc.) can be recognized
System processing, to learn user's traveling habit and viewing preference, to provide optimal user experience during their journey
It (spreads defeated PoP (point-of-presence, there are points) that is, selection is immediate, spread most preferably cutting between defeated PoP
It changes).
Geographical location information can in some instances, for ICN (networking centered on information) and CNN (with
Networking centered on content) the mobile cloud of geographical location perception in environment and the content caching of event triggering.In some examples
In, the mobile cloud of geographical location perception and the content caching of event triggering may include various assemblies, these components include being based on
The data mobility of trigger based on the position intelligent subscriber is used for the ambulant intelligent priority ranking of data, is used for data
Ambulant context-sensitive intelligence mark etc..
Each of these components part may be implemented as intelligently obtaining customer position information and utilize location aware
Property come the strategically mobile user data in a manner of providing seamless end-user experience, especially for low delay and in real time
Using.Here is the general description of each of various assemblies part.
Data mobility based on the trigger based on the position intelligent subscriber
Centralized intelligence system can monitor the geographical location of user (for example, the GPS location of automobile, user's mobile phone
Position etc.), and data are moved/copied to immediate content supplier or buffer memory device by Indicated Cloud.Intelligence system
The position of user can be used to determine to upload where data movement (to most suitable server, usually most connects in system
The server of nearly user).
Various optimizations can be realized for user data priority ranking, current, the Future Positions prediction of automated location etc..Separately
Outside, by using user location (current and/or following), which can postpone by reducing and improve overall user body
Test the user experience to significantly improve user in access media content.User can download and upload in both direction faster
Ground accesses data.
Predictive analysis can be used to determine that data user in where and will may need in the system.Example
Such as, if user is frequent traveller and has got new content recently, which can be actively mobile by new content
To desired locations.If user's specialized work can be preferably chosen related to the project in some emergent project, the system
The data of connection are for being pre-charged with, and old archive project can not be sent.Due to be data by before being actually needed this
What sample was done, it is possible to be carried out with lower bandwidth and/or cost.
If there is the content for being frequently visited by the user (or frequently accessing while advancing), then whenever user reaches newly
The content can be moved actively when position.
These concepts may be implemented in various contexts, for example, general brain scans may include thousands of files,
And size can be gigabytes.Therefore, brain scans can take a long time to obtain or download.Imagine high quality
Cat scan is stored in the cloud and downloads them when needed come the surgeon that is watched.When doctor goes to without good
When the position of good cloud covering, it may be very time-consuming for obtaining these images.But the system here will recognize use
Family is traveling at, and related scans can be actively moved to the more appropriate position of opposite physicians location.Doctor then may be used
With these scannings of less delay access.
As another example, media asset is stored in the cloud and needs from any current location all very simply by the imagination
Get the travelling correspondent or film maker of these media assets.Here the system can be reduced significantly from different positions
The delay that the reporter or film maker set is experienced.By the position of estimated reporter or film maker, which can be with
Potential broad medium file is pre-charged on the server that can quickly access, even if the network bandwidth at remote location can
It can be very low.
When data flow is received and forwarded by node, system can be data cached.In addition, various touchings can be used in system
Device is sent out to execute location-based data buffer storage.Trigger can be manual and/or automatic.Location-based data buffer storage and
The non-limiting example of trigger includes:
User hand trend cloud system designated position details is (for example, via for the button in the map application uploaded of travelling
Deng).
The stroke schedule regeneration of policy-driven, for example, user configuration is only being traveled beyond apart from 100 miles of home position
When the mobile strategy of trigger data.
The dynamic such as personal scheduler of routing, stroke reservation system, the schedule of user, user based on user obtains
The position data taken.
Geographical location trigger, for example, GPS, 3G/4G/5G/LTE, user roam into another carrier network etc..
Cognitive system (for example, the traveling mode learnt).
Content can also be denoted as " moving " content by user, this can trigger the location-based caching to the content.
For example, the system can track user, and attempt to make content be followed by user when user moves back and forth.
, can be by user data cache in one or more content transponders based on above example, this can improve simultaneously
Help access of the user to data.
For the ambulant intelligent priority ranking of data
Another component may include for the ambulant intelligent priority ranking of data.This component is provided to being determined
(or prediction) is for specific user or groups of users or classification and by movement (for example, such as in above data mobility assembly
It is described) user data assign priority ability.To the non-limiting example of the intelligent priority ranking of user data
Include:
User be manually specific data or certain types of data/application configuration assign priority (for example, profile,
Using etc. in).
Based on including frequency of use, use etc. recently including various algorithms the automatic of policy-driven is carried out to user data
Priority ranking.
Priority label is carried out to data based on the intelligence mark for being marked as mobile data.
Priority label is carried out to user data based on using to analyze.
The priority to user data based on cloud provider subscription level (for example, platinum grade, gold grade etc.) marks.
Based on the data priority by the analysis of study/cognitive system.This includes analyzing from pervious similar trip
Data access history.
For example, in one example, the user most possibly needs when system can determine on the road for specific user
Want what kind of data (for example, new data, big data, the data frequently accessed etc.).System can be based on various factors
Practise or find (for example, by using cognitive system) data use pattern, these factors are for example, starting point/destination geography
Position, trip type (for example, work or leisure), history of similar trip etc..
It can be according to single user and/or multiple users come affirmation mode.For example, system may learn when people travel round
Universal time, there are people to need a plurality of types of data of high speed access according to their destination: advancing to the use in the Antarctic Continent
Family is wanted to take home photos, and the user for advancing to Europe wants to take ENGINEERING CAD file.
For the ambulant context-sensitive intelligence mark of data
Another component may include for the ambulant context-sensitive intelligence mark of data.Can according to number of users
Data are indicated according to mobility correlation or influence user data ambulant mode.For example, user can use instruction
Whether some data should be carried out to indicate manually by mobile display label the data of user.In addition, user can be based on various shiftings
Dynamic property-influence criterion is come using the more complicated manual mark to data, for example, being that work is relevant or personal by content-label
(for example, leisure/interest/vacation).As needed, the granularity of mark can be flexible and be that embodiment is specific.
Mark can be manually, automatically, and/or even predictive.Some non-limiting examples may include:
User indicates manually.
User data is indicated automatically based on function (for example, work, individual etc.).
Based on carrying out the automatic user data that indicates using profile or analysis.
For the ambulant specific mark of application of data.
Based on the automatic mark of the cognition to past mark/learning system analysis.
For example, specific audio books supplier can be used in user, and have from technology books to interesting summer time
Read the various reading inventories in scope of listings.Based on context it is differently indicated in these audio books in some way
(for example, a book may have " movement-work " label, another writing materials have " movement-vacation " to the ability of every kind of audio books
Label) determining user will be in the summer during 22 days vacations with being based further on component intelligence discussed above for the system of can permit
The movement of the prestige name for ancient tribes in the east and data to immediate storage/buffer should be assigned with relevant " movement-vacation " label label
Data priority.
The disclosure is shown turning now to Fig. 3 A, Fig. 3 A for being based on user's context and information in different time in system
Or between position the example arranging system 300 of migrating data schematic diagram.User 310 can access user from homing position 302A
Data 312.Homing position 302A can be such position: user generally access the position of data 312, be specified in its into
Position that the position of row work, user 310 are resided in etc. (for example, geographical location or region, for example, country, city, state or
Continent;Building, for example, office building;Access point, for example, mist node, network or gateway;Address;Vehicles etc.).In order to clear
Chu and explanation, provide non-limiting example.In fact, position 304 can be user 310 accessed, accessing and/
Or the data 312 that use of expectation from any other position.
Data 312 can be hosted in cloud layer 154.Therefore, user 310 can be by cloud layer 154 and user in ownership position
Link A (314) between the calculating equipment at 302A is set from the data 312 on homing position 302A access cloud layer 154.Calculating is set
It is standby to can be any calculating and/or connection equipment (for example, client endpoint 116) with network capabilities.
User 310 can access data 312 from homing position 302A in the time 1 (306).However, it is possible to make user 310
Remote location 302B will be advanced in the time 2 (308) and may need or attempt in the time 2 (308) from remote location 302B
Access the judgement of data 312.In response, can make user can be in number from access of the remote location 302B to data 312
Remote node 162 is migrated to according to 312 (or a part of data 312) to allow user 310 by remote node 162 from remote
The judgement being enhanced in the case where journey position 302B access data 312.
For example, it is possible to make user from remote location 302B to the quality and/or characteristic of the access of data 312 (for example, property
Energy, safety, cost, bandwidth, delay, burden, resource requirement, stability or reliability etc.) user 310 pass through cloud layer 154
Or pass through (one or more) different node, (one or more) network, (one or more) cloud, (one or more)
Whether mist, position etc. preferably determine in the case where accessing data 312 from remote location 302B.If being made that user from long-range
Position 302B to the quality and/or characteristic of the access of data 312 can by allowing user 310 by remote node 162 rather than
Cloud layer 154 accesses data 312 come improved judgement, then data 312 and/or part of it can be moved to remote node 162.
Remote node 162 can be selected from one or more remote nodes, network, position etc..For example, can be based on remote
The geographic area of journey position 302B or any other node near zone or network select remote node 162.It can be with
Proximity on logic-based selects remote node 162, that is, in the case where not considering physical geographic location most efficiently
Or the network site of peak performance.In addition, in some cases, remote node 162 may include from identical network or layer (example
Such as, cloud layer 154, mist layer 156, identical network etc.) or multiple nodes from heterogeneous networks or layer.For example, in some cases,
Remote node 162 may include across heterogeneous networks or layer or the multiple nodes being distributed across identical network or layer.Herein, in order to
Clear and succinct, remote node 162 is referred to as the individual node as non-limiting example.
In order to determine user from remote location 302B access data 312 (one or more) quality and/or characteristic be
Data 312 are via cloud by the case where storage and access or the feelings that are stored and accessed via remote node 162 in data 312
Under condition, (one or more) quality and/or characteristic of link B and C (316,318) can be compared.Link B (316) can be from
Connection or link of the remote location 302B to cloud layer 154, and link C (318) can be from remote location 302B to long-range section
The connection of point 162 or link, wherein user alternatively can access data 312 from remote location 302B.
Therefore, the relative users access parameter that can be confirmed and compare or analyze link B and C (316,318), is used with determining
Family 310 should access data 312 by cloud layer 154 or remote node 162.It may include the following terms that user, which accesses parameter,
Parameter: performance quality (for example, delay, handling capacity or bandwidth, availability, uptime etc.), safe mass (for example, plus
Close, security risk or potential fragility, public's accessibility etc.), cost (for example, routing or switching cost, cost of serving etc.),
Geographical location is (for example, to the distance of remote location 302B, homing position 302A, and/or cloud layer 154;Such as country, continent, city
The geographical location in city, cities and towns or the like;Accessibility;Deng) etc..
When customer parameter instruction remote node 162 will improve performance quality (for example, more low delay, higher throughput or band
Wide, more multi-availability or uptime etc.), improve safe mass (for example, preferably encryption, lower security risk or
Fragility less accesses public or unauthorized user, bigger security control or strategy, bigger protection etc.), reduce cost
(for example, reduce routing or switching cost, reduce service charge or cost of serving, reduce the cost that resource or resource use etc.),
To better geographical location (for example, apart from upper closer or more neighbouring, more preferable or more resource of number etc.), reduce resource requirement
Or whens consumption etc., remote node 162 can be selected to be used to count as when user 310 is in remote location on cloud layer 154
According to 312 access point and/or storage point.
Once selecting and/or identifying remote node 162, so that it may move to a part of data 312 or data 312
Remote node 162 or network associated with remote node 162 (for example, mist 158, mist 160, mist layer 156, region cloud etc.).?
In some configurations, data 312 can be dispatched for moving to remote node 162 before the time 2 (308).But in some feelings
In condition, data 312 can be moved into remote node when user 310 advances to remote location 302B from homing position 302A
162, so that data start and at time 2 (308) at homing position 302A in remote node at time 1 (306)
Terminate at 162.It can choose the pre-set time amount that the selected data before T2 (308) moves to mist layer 156 from cloud layer 154, with
Adapt to the expection rate of transform on cloud to mist link 320.Therefore, in time T3 304, user data 312 will start from cloud layer 154
To the transmission of mist layer 156.
In some cases, data 312 can be moved to along from homing position 302A to the road of remote location 302B
Other nodes or access point (for example, network, gateway, server etc.) of diameter.For example, if user is just from New York to Turkey's row
It stops over into and London, then data 312 can be moved to before data 312 are moved to Turkey and be stopped in user
It stays in during London by the node of selection hosted data 312.Based on from London to the node link or connection it is associated
Data access parameters select the node.For example, can be to data 312 in London or the node due to the node
Smaller delay (when accessing the data from London) is provided and selects the node.Then, Turkey is reached from London in user 310
Before, data 312 can be moved to the remote node positioned at Turkey.
Fig. 3 B to 3E shows the example of the mobile cloud of geographical location perception.It is turning initially to Fig. 3 B, user 322 starts from him
The North Carolina state Raleigh city homing position 324 to Niagara Falls selected destination 320 summer highway
Trip.
When going on a journey beginning, user 322 can search the direction for going to stroke destination, and can be to content supplier
Travel map is shared by 334 (for example, providers of cloud 102).Content supplier 334 can determine the content points along travel path
326-332, these content points can be buffer and/or data center, for example, cloud or mist.Content supplier 334 can also be really
Determine the traveling mode of user 322, and estimates the substantially arrival time in intermediate geographical location.
If the subscriber carried out personal trip, content supplier 334 in the essentially identical time in the several years in past
It can intelligently and automatically determine that the trip is leisure or vacation trip.Content supplier 334 can be interested to user 322
Data set assigns priority, wherein the interested data set of user 322 is the new film for example, the favorite video presentations of user
Section, the most frequent audio frequency song listened to, the e-book currently read, user reading inventory newest nationality etc. of not reading.It takes
The certainly Estimated Time of Arrival at each intermediate geographical location (for example, point 328-332), the interested data set of user can be by
It is scheduling in trust or is buffered at the point 326-332 along travel path.
When user 322 is in the homing position 324 in Raleigh city, user 322 can access from the content points 326 in Raleigh city
Content.Content points 326 can provide the maximum in terms of cost and performance to user 322 when user is in homing position 324
Benefit.Content when user 322 advances, at the accessible each content points 328-332 along path of user 322.
With reference to Fig. 3 C, when user 322 advances, media client used in user 322 is (for example, web browser or matchmaker
Body player) it can be to the current geographic position of the update user of content supplier 334.Content supplier 334 can be used currently
Position determines when media client to be redirected to content points 344 from content points 326.Identical concept also can be extended
It is uploaded to media, for example, uploading real-time video from the external camera of the vehicles to immediate video cloud.This facilitate to
In the faster upload of the data (for example, for insure, the forensics analysis of legal, police's purpose traffic accident) of analysis and more fast
The availability of speed.
Current location information also allow content supplier 334 can determine travel path change and mark data by
Trustship is for the new medium content point that faster accesses.For example, content supplier 334 identifies Fu Jini in advance with reference to Fig. 3 B
Content points 328 at the city of the Norfolk Ya Zhou, as one in the potential host of the content-data along the path.But it is interior
Different content points can be selected based on change condition or situation by holding provider 334.For example, referring back to Fig. 3 C, content is mentioned
State of West Virginia Charleston city can be selected based on the current location 340 of user and any change condition for quotient 334
The content points 344 at place.
Current location information additionally aids when decision clears up after user 322 has passed through the middle position in travel path
Content caching.
Content supplier 334 can determine that the current location 340 of user is state of West Virginia Bake interests.Work as user
322 in state of West Virginia Bake interests, and next content points 344 can be identified as Xi Fujini by content supplier 334
Content points 344 in the city of the Charleston Ya Zhou, rather than the content points 328 in Norfolk Virginia city.As previously mentioned, can
To select content points 344 based on the current location 340 of (and being not limited to) user 322.Therefore, content points 344 can be user
322 be in the state of West Virginia Bake interests when user 322 nearest data center.The system is in the route or peace in face of variation
It is adjusted in the case where row, it is contemplated that the preparatory caching of selected data.
Content supplier 334 can redirect client with the content points 344 from the Charleston city of the state of West Virginia
Access (that is, download/upload) further data.If user 322 selects to check the segment of the performance X in this week, user 322
It can be from 344 streaming content of content points.Content supplier 344 should make content points 344 of the content in the city of Charleston
Place is available.Content then can be streamed to client from content points 344 at faster speed.User 322 can not have
Performance is enjoyed under conditions of any network interruption (for example, downloading delay, intermediate suspension, buffering etc.).
With reference to Fig. 3 D, user 322 can continue on path traveling.Content supplier 334 can determine user's 322
Current location 360 is city, Pittsburgh, Pennsylvania.When user 322 enters Pennsyivania, content supplier 334 can
It is located at next nearest content in the western Fabia state city, Pittsburgh of guest with the mark of current location 360 based on (but being not limited to) user
Point 330.Content supplier 334 can then redirect client with from the content points 330 in the western Fabia state city, Pittsburgh of guest
Access (that is, download/upload) further content.
For example, it is assumed that user 322 accesses an e-book " Tourist Points in Buffalo bought recently
(tourist spot of Buffalo) " is to start the activity during arrangement rests on stroke destination.Content supplier 334 is upper and lower
The e-book is denoted as " movement-vacation " data set in text and the electronic copies of the e-book are moved to Pittsburgh
The content points 330 in city.This enables quick-downloading e-book while on the way traveling of user 322.
With reference to Fig. 3 E, when content supplier 334 determines that the current location 380 of user 322 is the New York city Ai Mosite,
Content supplier 334 can be located at the next of New York Buffalo city based on the mark of current location 380 of (and being not limited to) user
A content points 332.Content supplier 334 can redirect client to access from the content points 322 in city, Pittsburgh into one
The data of step.It, can be from the content points in Buffalo city when user reaches stroke destination 320-- Big Fall In Niagara
332 download contents and/or upload content to the content points, because the content points are the tools in Big Fall In Niagara of user 322
It is provided with the nearest data cloud of the optimum performance of optimal user experience.In addition, the travelling stage described in fig. 3e, content is provided
Quotient 334 can be written to the user data in preceding node (for example, 330) and copy back into ownership cloud 326, then from intermediate node
330 delete all data used associated with the trip.
User 322 can access his/her favorite audio album during Big Fall In Niagara is taken a walk.Content provides
The favorite audio frequency song of user will be classified as " mobile-personal " by quotient 334, and the data set is moved to Buffalo city
In content points 332.Therefore, the client of user can be downloaded from cloud spreads transfer audio, and postpones in no any downloading
In the case where play the song immediately.Similarly, user 322 can be during resting on Big Fall In Niagara immediately from content
Point 332 accesses other interested data, for example, favorite video presentations, e-book, home photos.
When forecasting or predicting the content points along travel path, user 322 is can be used in difference in content supplier 334
The current location of period.Content supplier 334 can also calculate or predict that user 322 incites somebody to action in different time when user advances
In where.As previously mentioned, content supplier 334 can also be confirmed position data using other information, make content
Point prediction, and/or data cached.
For example, user 322 can inwardly hold the stroke list that user shares in provider 334 from travel site or course line website.
For example, it is the Africa at 12345 that user 334, which advanced to postcode from USA using course line B July 4,.Based on routing,
A few hours before July 4, the individual of user 322 or work-relevant data are buffered in one around the position 12345 in Africa
In a or multiple content transponders.If course line B has the arranging of interim hosted data, the number of user during flight duration
According to can be buffered in aircraft.When user 322 reaches Africa, data will be used for quickly visiting in nigh caching
It asks.
In addition, past traveling event can be used definitely to predict upcoming traveling meter in content supplier 334
It draws.For example, user 322 generally advances to Europe during vacation in December range.
Cognitive system can attend the run-length data of Cisco Live (Cisco scene) or IETF meeting every year based on user
Corpus (for example, timetable, stroke list, social media system etc.) learnt, and can determine these at hand
Position and the data of user are moved to the position.
Content supplier 334 is also based on the personal use of data or based on the groups of data using determining needs
What mobile data.For example, for the next Cisco Live meeting that will be carried out in New Zealand, content supplier 334 can be with
Actively or manually by the display data of meeting and necessary data move closer near region.
Some fundamental system components and concept has been disclosed, the disclosure is implemented turning now to instance method shown in Fig. 4
Example.For sake of simplicity, describing the party according to framework 100 and 150 shown in figure 1A and 1B and arranging system shown in Fig. 3 300
Method.The step of summarizing herein is exemplary and can be with any combination of these steps (including exclusion, addition or modification
The combination of certain steps) Lai Shixian.
In step 400, this method may include: to determine that user (310) will be in the second time in (306) at the first time
(308) it needs to be stored in the data (312) that first position (102) store from the second position (302) access.Data (312) can be with
It is serviced including any type of data and/or (one or more), for example, streaming media, file, application content, database
Content, storing data etc..In addition, the determination at step 400 place may include that prediction user (310) will be needed from the second position
(302) data (312) are accessed.This method factor and/or source can predict the Future Positions of user based on one or more.
The schedule or timetable that factor and/or the non-limiting example in source include user (310) are (for example, the electricity of user
Sub- mail or business schedule);The previous traveling mode of user (310) (for example, traveling history of user);It is mentioned from social networks
Take data (for example, the state from user (310) or user contact updates, the comment in the social network page of user,
User publication comment, the link on social networks associated with user (310) or upload, and/or come from user (310) or
Any other activity in the social networks of other users associated with user (310));Network associated with the user is inclined
It is good;Current and/or former network associated with user (310) or data use pattern;Communication associated with user (310)
(for example, user (310) send or receive Email, user 310 create message, user generate request (for example, from
The second position (302) accesses the help desk request of data (312), carries out the long haul communication enabled on the phone of user
Request etc.);It is associated with user (310) one or more predetermined or reserved (for example, plane ticket, automobile leasing are predetermined, hotel
Reserved, restaurant reserves, meeting room or office are reserved, profession is appointed etc.);Navigation or positioning system are (for example, GPS system, map
Or navigation software application, positioning service or application, the positioning of smart phone and movement);And/or instruction user is just or will be to second
Any information that position (302) is advanced is (for example, information, the credit card of toll ticket or garage ticket have been bought in instruction
Activity (for example, purchase company credit card), instruction are to interested web browser of different location etc.).
In step 402, this method may include: mark can storing data (312) and can by calculating equipment (116) from
The network node (162) of the second position (302) access.Network node can be identified based on the following terms: the second position (302)
(for example, geographical location of the second position) available any (one or more) network and/or connects at the second position (302)
Access point, the second place available link, the available node in the second place and/or link performance or security parameter and/
Or characteristic, near the second position (302) in region and/or can be to equipment offer connect from remote location (302)
The performance of threshold levels or the mist of safety and/or cloud node (for example, local or region mist or Yun Jiedian) etc..Near zone can
Be physics/or it is geographic or based on network topology in logic near region.
Network node (162) can be selected from the multiple both candidate nodes for hosted data (312) identified.It can be with
Based on corresponding proximity or geographical location, connection/service respective performances or quality, corresponding link cost, corresponding
Safety condition or ability, corresponding resource capability or requirement etc., select network node from multiple both candidate nodes.
Network node (162) can be mist node (for example, mist layer 156), Yun Jiedian (for example, region cloud), local node
(for example, the node in same local network, the node in identical private network, node in same geographic location etc.) etc..One
In a little situations, network node (162) can be local mist node or region cloud node.
This method may include: to determine and the between calculating equipment (116) and first position (102) in step 404
One network connection or the associated first service parameter of link (316);And in step 406, determines and calculating equipment (116)
The second network connection or the associated second service parameter of link (318) between network node (116).First and second clothes
Parameter of being engaged in may include data access performance parameter (for example, shake, delay, bandwidth etc.);Data or network-access security ginseng
Number (for example, encryption, security clearance, security strategy, data protection program, safe floor etc.);Cost (for example, service or resource at
Sheet, routing cost, is subscribed to cost, resource requirement or is utilized at bandwidth cost);QoS parameter;Plan from specific organization
Summary or preference;And/or service or the quality related parameter of any other type.
In step 408, when there is second service parameter service parameter more higher than first service parameter to score, this method
It may include: that a part of data (312) is moved into network node from first position (102) before the second time (308)
(162).By moving to network node (162) a part of data (312), this method, which can permit, calculates equipment (116)
Access the part of data (312) from the second position (302) by network node (162) in the second time (308).
In step 408, a part of data (312) can be moved to network node (162) and network node (162)
Associated network, and/or via network node (162) addressable any position.In addition, in order to determine second service parameter
It scores with service parameter more higher than first service parameter, the first and second service parameters can be compared which (a little) determined
Parameter indicates higher performance rate (for example, compared with low delay, higher bandwidth, lower error, higher uptime or can
With property, lower response time, lower hop count etc.), higher service quality rating, higher security level (for example, plus
Close, access limitation, safety condition and/or strategy, firewall rule, safe floor, security protocol etc.), lower cost (for example,
Lower resource consumption, lower subscription or service rate, lower resource requirement etc.), to the second position (302) and/or excellent
Select the closer physically or logically proximity etc. in geographical location.
In some cases, this method can also comprise determining that after (306) at the first time but in the second time
(308) the third time before, wherein user (310) will not need access data (312) in the third time;And
The migration at step 408 place is executed during three times.The third time can be the downtime of user.For example, the third time can be with
It is user by traveling, period for resting, have a meal etc. and data (312) may not being accessed.For example, this method may include:
User (310) interphase in third is predicted based on the estimation traveling time between first position (304) and the second position (302)
Between will not need access data (312), wherein traveling mode be not easy to network access.It can be estimated based on the following terms to determine
Count traveling time: traveling mode (for example, automobile, train, aircraft, helicopter, slide plate etc.), travel distance (for example, 10 miles,
100 miles, 1000 miles etc.), travel speed (for example, average travel speed, current travel speed etc.), one or more estimations
When previous traveling between traveling condition (for example, traffic, delay, weather etc.), first position (304) and the second position (302)
Between (for example, based on statistics or historical data etc.), stroke segmentation or means of transportation (for example, ride in an automobile, then airplane,
Then used during taking train) number, the timetable of announcement etc..
After identifying the third time, this method may include: (one or more that mark moves to data (312)
It is a) the second network node, to allow user (310) to access data (312) from (one or more) second network node.It can be with
(one or more) second network node is identified based on the following terms: from the position of user (310) during the third time
To the quality of the connectivity of (one or more) second network node, during the third time user (310) to (one or more)
The accessibility of second network node, during the third time (one or more) second network node to user (310) away from
From and/or proximity etc..The quality of connectivity can based in user (310) during the third time from first position
(304) user equipment and (one or more) second network node when advancing to the second position (302) from user location
Between connection or link one or more parameters or characteristic.The one or more parameter or characteristic can define service performance
(for example, delay, handling capacity or bandwidth etc.), safety, reliability etc..
In some cases, this method may include: to determine between first position (304) and the second position (302)
Travel path or method;One or more network nodes are identified, for example, in user in first position (304) and the second position
(302) by mist node (162) accessible by user when advancing between;And one or more of identified node of selection with
For migrating data (312), so that user (310) can access data by these selected one or more nodes
(312).Selected one or more nodes can be selected based on performance, distance or proximity, safety, cost etc..
For example, selected one or more node can be user when user (310) advance can access most from the position of user
Closely, most fast, most safe, generally the least expensive, and/or peak performance (one or more) node.If the vehicles of user (fly
Machine, train, ship, taxi etc.) it include mobile mist node, then data (312) can be migrated on the movement mist node simultaneously
And it is taken together with user for best possible connectivity.
The disclosure shows example apparatus turning now to Fig. 5 the and Fig. 6 A-B for showing example apparatus.
Fig. 5 shows the example network device 500 for being adapted for carrying out exchange, port-mark, and/or port authorization operation.
The network equipment 500 includes main central processing unit (CPU) 504, interface 502 and bus 510 (for example, pci bus).When
When being acted under the control of appropriate software or firmware, CPU 504 is responsible for executing grouping management, error-detecting, and/or routing function
Energy.CPU 504 preferably realizes all these function under the control of software and any appropriate application software including operating system
Energy.CPU 504 may include one or more processors 508, for example, coming from Intel's x86 microprocessor family, Motorola
The processor of microprocessor family or MIPS microprocessor family.In alternative embodiments, processor 508 is for controlling net
The specially designed hardware of the operation of network equipment 500.In a particular embodiment, memory 506 (for example, non-volatile ram,
TCAM, and/or ROM) also formed CPU 504 a part.But there are many not Tongfangs that memory may be coupled to system
Formula.
Interface 502 is generally provided as modular interface card (sometimes referred to as " line card ").Generally, they control data
It is grouped in sending and receiving on network, and supports other peripheral equipments being used together with the network equipment 500 sometimes.It can be with
The interface of offer is Ethernet interface, Frame Relay Interface, cable interface, DSL interface, token ring interface etc..Furthermore it is possible to provide
The interface of various very high speeds, for example, fast token ring interfaces, wireless interface, Ethernet interface, gigabit ethernet interface,
Atm interface, hssi interface, pos interface, fddi interface, WIFI interface, 3G/4G/5G cellular interface, CAN BUS, LoRA etc..One
As, these interfaces include suitable for the port with appropriate medium communication.In some cases, they can also include independent process
Device, and in some instances may include volatibility RAM.Independent processor can control such as packet switch, medium control,
The communications-intensive tasks of signal processing, Cipher Processing and management etc.The list of communications-intensive tasks is used for by providing
Only processor, these interfaces allow main microprocessor 504 to be effectively carried out router-level topology, network diagnosis, security function etc..
Although system shown in fig. 5 is a particular network device of the invention, it is not that may be implemented on it
Only network device architecture of the invention.For example, usually using the single processor with manipulation communication and router-level topology
Framework etc..In addition, other kinds of interface and medium can be used for router.
Regardless of the configuration of the network equipment, the program that general-purpose network operations can be used for using storage is configured as
It instructs and for roaming described herein, one or more memories of the mechanism of routing optimality and routing function or storage
Device module (including memory 506).Program instruction can control the behaviour for example to operating system and/or one or more application
Make.One or more memories can be additionally configured to storage such as mobility binding list, registration form and contingency table or the like
Table.Memory 506 can also save various application container engines (docker), container and virtual execution environment and data.
The network equipment 500 can also include specific integrated circuit (ASIC) 512, which, which can be configured as, executes routing
And/or swap operation.ASIC 512 can be communicated via bus 510 with the other assemblies in the network equipment 500, to exchange data
With various types of operations (for example, routing, exchange, and/or data storage operations) of signal and coordination network equipment 500.
Fig. 6 A and Fig. 6 B show exemplary system embodiment.When implementing this technology, being more appropriately carried out example will be for
Those of ordinary skill in the art are apparent.Those of ordinary skill in the art also will be readily understood that, other systems embodiment
It is also possible.
Fig. 6 A shows system bus computing system framework 600, wherein the component of the system is electric each other using bus 606
Communication.Exemplary system 600 includes processing unit (CPU or processor) 604 and system bus 606, system bus 606 will include
Various system components including system storage 620 are (for example, read-only memory (ROM) 618 and random access memory (RAM)
616) it is coupled to processor 610.System 600 may include directly connecting, being in very close to processor 610 with processor 610
Position or be integrated into processor 610 a part high-speed memory caching.System 600 can be by data from storage
Device 620 and/or storage equipment 608 copy to caching 602, the quickly access of device 604 for processing.In this way, caching can be provided and be kept away
Exempt from the performance boost of delay of the processor 604 in equal pending datas.These and other modules can control or be configured as to control
Processor 604 processed executes various movements.Also other systems memory 620 can be used.Memory 620 may include having difference
A variety of different types of memories of performance characteristics.Processor 604 may include any general processor and hardware module or soft
Part module, for example, be stored in it is in storage equipment 608, be configured as control processor 604 and general processor is (wherein, soft
Part instruction is incorporated into actual processor design in) module 1 610, module 2 612 and module 3 614.Processor 604
It substantially can be completely self contained computing system, include multiple cores or processor, bus, Memory Controller, caching etc..
Multi-core processor can be symmetrically or non-symmetrically.
It is interacted in order to enabled with user that is calculating equipment 600, input equipment 622 can indicate any number of input machine
Structure, for example, the touch sensitive screen, keyboard, the mouse, movement input, voice that are used for the microphone of voice, are inputted for posture or figure
Deng.Output equipment 624 is also possible to one of a variety of output mechanisms well known by persons skilled in the art or a variety of.In some realities
In example, multimodal systems can be used family and be capable of providing a plurality of types of inputs to communicate with calculating equipment 600.Communication interface
626 can generally dominate and manage user's input and system output.For the operation in any specific hardware layout, there is no limit,
Therefore when developing improved hardware or firmware is arranged, essential characteristic here can be easy to be replaced by these warps
Cross improved hardware or firmware arrangement.
Storage equipment 608 is nonvolatile memory and can be hard disk or can store computer-accessible number
According to other kinds of computer-readable medium, for example, cassette, flash card, solid-state memory device, digital versatile disc, magnetic
Tape drum (cartridge), random access memory (RAM) 616, read-only memory (ROM) 618 or their combination.
System 600 may include integrated circuit 628, for example, being configured as executing the specific integrated circuit of various operations
(ASIC).Integrated circuit 628 can be coupled with bus 606, to communicate with the other assemblies in system 600.
Storage equipment 608 may include the software module 610,612,614 for control processor 604.It is also envisioned that
Other hardware or software module.Storage equipment 608 may be coupled to system bus 606.On the one hand, the hardware of specific function is executed
Module may include the component software of storage in computer-readable medium, which combines necessary hardware component (example
Such as, processor 604, bus 606, output equipment 624 etc.) realize the function.
Fig. 6 B shows the example computer system 650 with chipset framework, which can be used for executing
Described method, generation simultaneously show graphic user interface (GUI).Computer system 650 can be used to realize disclosed
The example of the computer hardware of technology, software and firmware.System 650 may include processor 652, and processor expression can
Execute any number of physically and/or logically upper difference of the software for being configured as executing identified calculating, firmware and hardware
Resource.Processor 652 can be communicated with chipset 660, and chipset 660 can control to and from the defeated of processor 655
Enter and exports.In this example, chipset 654 is to output end 662 (for example, display) output information, and can read simultaneously
Information is written to storage equipment 664, storage equipment 664 may include such as magnetic medium and solid state medium.Chipset 654 can be with
Data are read from RAM 666 and data are written to RAM 666.For the bridge 656 with various 658 interfaces of user's interface unit
It can be provided for and 654 interface of chipset.This user's interface unit 658 may include keyboard, microphone, touch detection
And processing circuit, pointing device (for example, mouse) etc..Generally, in the input of system 650 can come from each provenance, machine generates
Appearance, and/or the mankind generate any one in content.
Chipset 654 can also physical interfaces different from can have 660 interface of one or more communication interfaces.These
Communication interface may include for wired and wireless local area network, for broadband wireless network and connecing for individual domain network
Mouthful.It may include receiving physical interface for generating, showing and using some applications of the method for GUI disclosed herein
Ordered data collection or can by by processor 654 analyze be stored in storage equipment 664 or 666 in data come by machine
Itself is generated.It inputs and in addition, machine can be received via user's interface unit 658 from user by using processor 652
These inputs are parsed to execute appropriate function (for example, browsing function).
It is to be appreciated that example system 600 and 650 can have more than one processor 604/652, or can be
Networking provides the group of the calculating equipment of bigger processing capacity or a part of cluster together.
In short, describe for data center resource and user to the access of data carry out the system of layout, method and
Computer-readable medium.In some instances, a kind of system can first time determine user will the second time need from
Second position access is stored in the data at first position.The system can identify being capable of storing data and can be by equipment from
The node of two positions access.The system can also determine associated with the network connection between equipment and first position first
Service parameter and second service parameter associated with the network connection between equipment and node.When second service parameter has
When having than first service parameter higher quality, data can be moved to node from first position by system, so that equipment passes through
Node accesses data from the second position.
In order to get across, in some instances, this technology be can be presented that including independent functional block comprising include
Have a functional block of the following terms: equipment, apparatus assembly, software realization method in step or routine or software and hardware
Combination.
In some embodiments, computer readable storage devices, medium and memory may include include bit stream etc.
Wired or wireless signal.But when mentioning non-transient computer readable storage medium, clearly excludes such as energy, carries
The medium of wave signal, electromagnetic wave and signal itself etc.
Storage can be used in computer-readable medium or can otherwise be obtained from computer-readable medium
Computer executable instructions realize according to the method for above-mentioned example.These instructions may include for example, promoting or configuring general
Computer, special purpose computer or dedicated treatment facility execute the instruction and data of some function or function group.It can be in network
Computer resource part used in upper access.Computer executable instructions can be for example, binary intermediate format instructions
(for example, assembler language), firmware or source code.Used instruction, information can be used to store, and/or according to described
The example of the computer-readable medium of the information created during exemplary method includes disk or CD, flash memory, with non-volatile
USB device, the networked storage devices etc. of property memory.
Realize that according to the equipment of the method for these disclosures may include hardware, firmware, and/or software, and can be with
Using any one desktop, laptop in various forms factor.The typical case of these desktop, laptops include laptop computer,
Smart phone, small sized personal computer, personal digital assistant, rack-mounted installation equipment, autonomous device etc..Functionality described herein
Also it may be implemented in peripheral equipment or package card.These functions also may be implemented for example, executing in one single not
With on the circuit board among processing or different chips.
Instruction, for transmit these instruction medium, for execute these instruction computing resource and for supporting this
The other structures of a little computing resources are for providing the component of function described in these disclosures.
Although using various examples and other information come explain in scope of the appended claims for the use of, should not
Any restrictions that claim is implied based on the special characteristic or arrangement in these examples, because of those of ordinary skill in the art
It will enable and derive various embodiments with these examples.Although having used structure feature and/or the example of method and step special
The some themes of fixed language description, it is to be understood that theme defined in the appended claims is not necessarily limited to be retouched
These features stated or movement.For example, this function can differently be distributed other other than the component identified herein
It is performed in component or in these components.On the contrary, open described feature and step, the model as appended claims
The example of the component of system and method in enclosing.
One or more members of the claim language instruction set of " at least one " in reference set meet right
It is required that.For example, the claim language of reference " at least one of A and B " indicates A, B or A and B.
In addition, as used in this article, " a part " of term article or the "at least a portion" of article indicate entire object
Product or less than entire article but be greater than zero arbitrary portion.For example, the claim language of reference " a part of X " indicates X's
Entire part or entire part less than X but be greater than zero arbitrary portion.Similarly, it quotes " at least part of X "
Claim language indicate X entirety or entirety less than X but be greater than zero X arbitrary portion.
Claims (23)
1. a kind of method, comprising:
The data that user will need to store at the access first position of the second position in the second time are determined in first time;
Network node is identified, the network node:
The data stored at the first position can be stored;And
It can be accessed by calculating equipment from the second position;
Determine first service parameter associated with the first network connection between the calculating equipment and the first position;
Determine second service parameter associated with the second network connection between the calculating equipment and the network node;
And
When there is the second service parameter service parameter more higher than the first service parameter to score, at described second
Between before a part of the data moved into the network node from the first position, and pass through the network node
The access from the second position to the part of the data is provided to the calculating equipment.
2. the method as described in claim 1, further includes:
Determine the third time before second time, the user described in the third time will not need to access the number
According to;
Wherein, the migration of the part of the data is performed during the third time.
3. method according to claim 2, wherein determine that wherein described user will not need to access described the of the data
Three times included: that the prediction user will not need to access the data during the third time, and the prediction is based on institute
State the estimation traveling time between first position and the second position.
4. method as claimed in claim 3, wherein the estimation traveling time be based at least one of the following terms come
Determining: traveling mode, travel distance, travel speed and one or more estimation traveling conditions.
5. method according to any one of claims 1 to 4, wherein the network node include in the following terms at least
One: the cloud node in the mist node resided in the mist layer of mist computing architecture and the cloud for residing in cloud computing framework.
6. the method as described in any one of claims 1 to 5, wherein determine that the user will need access the data packet
Including the prediction user will be in the second position in second time, and the prediction is based at least one in the following terms
Person: timetable or schedule associated with the user, previous traveling mode associated with the user, from social networks
The data of extraction, data associated with the user or network preference, data associated with the user or Web vector graphic
Habit, one or more associated with the user are reserved or predetermined, navigate or the user of positioning system, current or past is living
The instruction that dynamic instruction and the user are traveling at.
7. such as method described in any one of claims 1 to 6, further includes:
Determine the period that the wherein described user will advance from the first position to the second position;And
Mark resides in the second network node at least one of the following terms: 1) in the wherein user by the institute of traveling
Region near one or more positions where the user is estimated during stating the period, 2) it will with the user wherein
The associated geographic area in one or more positions and 3) where the user is estimated during the period advanced
Logical network near zone associated with one or more of positions;And
The part of the data is moved into second network node, so that the user visits during the period
It asks.
8. the method for claim 7, wherein second network node includes in the mist layer for reside in mist computing architecture
Mist node.
9. method according to claim 8, wherein the mist node is identified based at least one of the following terms
: position, user estimation at least part of the period during of the user during the period
Position, the traveling mode of the user, the travel speed of the user, estimation travel path associated with the user, institute
State one or more mist nodes in user and the mist layer proximity and the wherein user will be described in traveling
The characteristic or topology of at least one of the addressable wireless network of user or described mist layer during period.
10. method as claimed in claim 9, further includes:
The part of the data is moved from the mist node in second time based at least one of the following terms
Move on to the network node: 1) user be in the first near zone of the second position first determine or 2)
The user is in the second judgement outside the second near zone of the mist node;
Wherein, the part for being partly comprised in the data of the data by when the mist node trustship to the number
According to one or more changing of making of the part.
11. method as claimed in claim 10, wherein the network node includes the second mist node and Yun Jiedian, wherein will
It includes one of the following terms that the part of the data, which moves to the network node:
First segment of the part of the data is moved into the cloud node, and by the of the part of the data
Two segments move to the second mist node;Or
The part of the data is moved into the cloud node, and then based on more compared to user described in the cloud node
At least segment of the part of the data is moved to the second mist node by the judgement close to the second mist node.
12. the method as described in any one of claims 1 to 11, further includes:
Determine that the user will need the third time after second time to access the data from the first position;
Before the third time, at least described part of the data is migrated back described first from the network node
It sets.
13. a kind of system, comprising:
One or more processors;And
It is wherein stored at least one computer readable storage medium of instruction, described instruction is by one or more of processing
It includes the operation of the following terms that device, which executes one or more of processors:
The data that user will need to store at the access first position of the second position in the second time are determined in first time;
Network node is identified, the network node:
The data stored at the first position can be stored;And
It can be accessed by calculating equipment from the second position;
Determine first service parameter associated with the first network connection between the calculating equipment and the first position;
Determine second service parameter associated with the second network connection between the calculating equipment and the network node;
And
When there is the second service parameter service parameter more higher than the first service parameter to score, at described second
Between before a part of the data moved into the network node from the first position.
14. it system as claimed in claim 13, is stored with extra-instruction at least one described computer readable storage medium,
These extra-instructions make when being executed by one or more of processors the execution of one or more of processors include with
The operation of lower items:
The downtime for determining the user, the user described in the downtime will not need to access the data, described to delay
The machine time is after the first time and before second time;And
Wherein, the migration of the part of the data is executed during the downtime.
15. system as claimed in claim 14, it is stored with extra-instruction at least one described computer readable storage medium,
These extra-instructions make when being executed by one or more of processors the execution of one or more of processors include with
The operation of lower items:
Determine the third place that the user has advanced to outside the threshold range in the network node;And
At least part of the data is removed from the network node.
16. the system as described in any one of claim 13 to 15, wherein the network node is first network node, institute
It states at least one computer readable storage medium and is stored with extra-instruction, these extra-instructions are by one or more of places
It includes the operation of the following terms that reason device, which executes one or more of processors when executing:
Determine the period that the wherein described user will advance to the second position;And
Mark resides in the second network node at least one of the following terms: 1) in the wherein user by the institute of traveling
The range of one or more positions where the user is estimated during stating the period, 2) it will advance with the user wherein
The period during the user be estimated where the associated geographic area in one or more of positions and 3)
Logical network near zone associated with one or more of positions;And
At least segment of the part of the data is moved into second network node, so that the user is when described
Between access during section;
Wherein, second network node includes the mist node in the mist layer for reside in mist computing architecture.
17. a kind of non-transient computer readable storage medium for being stored with instruction, described instruction make when being executed by processor
The processor executes the operation including the following terms:
Determine data of the user by needs in future time from trustship at remote location access homing position;
Mark resides in one or more network nodes at least one of the following terms: the Logic Networks of the remote location
The Near Threshold region of network near zone, the same geographical area of the remote location and the remote location;And
Before the future time by a part of the data of trustship at the homing position move to it is one or
Multiple network nodes.
18. non-transient computer readable storage medium as claimed in claim 17, is stored with extra-instruction, these extra-instructions
Executing the processor includes the operation of the following terms:
Determine the period that the wherein described user will advance to the remote location;
Mark resides in network node at least one of the following terms: 1) the wherein user by traveling it is described when
Between one or more positions where the user is estimated during section range and 2) will advance with the user wherein
The period during the user be estimated where the associated geographic area in one or more of positions;And
At least segment of the part of the data is moved into the network node, so that the user is in the period
Period access.
19. non-transient computer readable storage medium as claimed in claim 18, in which:
The network node includes the mist node in the mist layer for reside in mist computing architecture;And
The mist node is identified based at least one of the following terms:
The current location of the user;
Estimated location of the user during at least part of the period;
The traveling mode of the user;
The travel speed of the user;
Estimation travel path associated with the user;
The proximity of one or more mist nodes of the user into the mist layer;And
The topology or characteristic of at least one of the following terms: the wherein user will during the period of traveling it is described
The addressable wireless network of user, the mist layer and the cloud computing framework.
20. non-transient computer readable storage medium as claimed in claim 19, is stored with extra-instruction, these extra-instructions
Executing the processor includes the operation of the following terms:
The part of the data is moved from the mist node in the future time based at least one of the following terms
Move on to one or more of network nodes: what 1) user was in the first near zone of the remote location first sentences
Determine or 2) user is in the second judgement outside the second near zone of the mist node;
Wherein, at least segment of the part for being partly comprised in the data of the data is by the mist node trustship
When at least segment of the part of the data make it is one or more change, it is and wherein, one or more of
Network node includes the second mist node.
21. a kind of device, comprising:
For determining the data that user will need to store at the access first position of the second position in the second time in first time
Component;
For identifying the component of network node, the network node:
The data stored at the first position can be stored;And
It can be accessed by calculating equipment from the second position;
For determining first service associated with the first network connection between the calculating equipment and the first position
The component of parameter;
For determining second service associated with the second network connection between the calculating equipment and the network node
The component of parameter;And
For when there is the second service parameter service parameter more higher than the first service parameter to score, described the
A part of the data is moved into the component of the network node from the first position and is used to lead to before two times
Cross portion of the network node to the calculating equipment offer from the second position to the access of the part of the data
Part.
22. device as claimed in claim 21, further includes: for realizing according to any one of claim 2 to 12
The component of method.
23. computer program, computer program product or the logic of a kind of coding on a tangible computer-readable medium, including
For realizing the instruction of method according to any one of claims 1 to 12.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/289,755 US10523592B2 (en) | 2016-10-10 | 2016-10-10 | Orchestration system for migrating user data and services based on user information |
US15/289,755 | 2016-10-10 | ||
PCT/US2017/044437 WO2018071086A1 (en) | 2016-10-10 | 2017-07-28 | Orchestration system for migrating user data and services based on user information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109844728A true CN109844728A (en) | 2019-06-04 |
CN109844728B CN109844728B (en) | 2023-09-15 |
Family
ID=59656183
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780062108.5A Active CN109844728B (en) | 2016-10-10 | 2017-07-28 | Orchestration system for migrating user data and services based on user information |
Country Status (4)
Country | Link |
---|---|
US (3) | US10523592B2 (en) |
EP (1) | EP3523733A1 (en) |
CN (1) | CN109844728B (en) |
WO (1) | WO2018071086A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110929317A (en) * | 2019-10-17 | 2020-03-27 | 广联达科技股份有限公司 | Method, system and computer readable storage medium for automatically complementing user component modeling information |
CN111935784A (en) * | 2020-08-12 | 2020-11-13 | 重庆邮电大学 | Content caching method based on federal learning in fog computing network |
CN113614692A (en) * | 2020-02-19 | 2021-11-05 | 茨特里克斯系统公司 | Migration of desktop workloads |
CN114207570A (en) * | 2019-08-07 | 2022-03-18 | 国际商业机器公司 | Techniques for identifying segments of an information space by active adaptation to an environmental context |
CN114270322A (en) * | 2019-08-28 | 2022-04-01 | 国际商业机器公司 | Data relocation management in data center networks |
CN114296405A (en) * | 2020-09-22 | 2022-04-08 | 罗克韦尔自动化技术公司 | Implementation of serverless functionality using container orchestration systems and operating technology devices |
CN115866047A (en) * | 2023-01-31 | 2023-03-28 | 华控清交信息科技(北京)有限公司 | Data redirection method and device in multi-party security computing and electronic equipment |
Families Citing this family (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10756970B1 (en) * | 2019-02-20 | 2020-08-25 | Amdocs Development Limited | System, method, and computer program for automatic reconfiguration of a communication network |
WO2015172107A1 (en) | 2014-05-09 | 2015-11-12 | Nutanix, Inc. | Mechanism for providing external access to a secured networked virtualization environment |
US10719305B2 (en) | 2016-02-12 | 2020-07-21 | Nutanix, Inc. | Virtualized file server tiers |
US11218418B2 (en) | 2016-05-20 | 2022-01-04 | Nutanix, Inc. | Scalable leadership election in a multi-processing computing environment |
US10171622B2 (en) * | 2016-05-23 | 2019-01-01 | International Business Machines Corporation | Dynamic content reordering for delivery to mobile devices |
US9749412B1 (en) * | 2016-09-21 | 2017-08-29 | International Business Machines Corporation | Predictive file synchronization |
US9906401B1 (en) | 2016-11-22 | 2018-02-27 | Gigamon Inc. | Network visibility appliances for cloud computing architectures |
US11568073B2 (en) | 2016-12-02 | 2023-01-31 | Nutanix, Inc. | Handling permissions for virtualized file servers |
US11562034B2 (en) | 2016-12-02 | 2023-01-24 | Nutanix, Inc. | Transparent referrals for distributed file servers |
US10728090B2 (en) * | 2016-12-02 | 2020-07-28 | Nutanix, Inc. | Configuring network segmentation for a virtualization environment |
US10824455B2 (en) | 2016-12-02 | 2020-11-03 | Nutanix, Inc. | Virtualized server systems and methods including load balancing for virtualized file servers |
US11294777B2 (en) | 2016-12-05 | 2022-04-05 | Nutanix, Inc. | Disaster recovery for distributed file servers, including metadata fixers |
US11288239B2 (en) | 2016-12-06 | 2022-03-29 | Nutanix, Inc. | Cloning virtualized file servers |
US11281484B2 (en) | 2016-12-06 | 2022-03-22 | Nutanix, Inc. | Virtualized server systems and methods including scaling of file system virtual machines |
US10423634B1 (en) | 2016-12-27 | 2019-09-24 | EMC IP Holding Company LLC | Temporal queries on secondary storage |
US10353603B1 (en) * | 2016-12-27 | 2019-07-16 | EMC IP Holding Company LLC | Storage container based replication services |
US11080245B2 (en) * | 2017-02-10 | 2021-08-03 | DaStratum, Inc. | Multi-tier cloud file system |
US10169973B2 (en) * | 2017-03-08 | 2019-01-01 | International Business Machines Corporation | Discontinuing display of virtual content and providing alerts based on hazardous physical obstructions |
US11368872B2 (en) * | 2017-03-27 | 2022-06-21 | Nec Corporation | Communication apparatus, base station, radio resource allocation method, and computer readable medium |
US10171377B2 (en) * | 2017-04-18 | 2019-01-01 | International Business Machines Corporation | Orchestrating computing resources between different computing environments |
US10691945B2 (en) | 2017-07-14 | 2020-06-23 | International Business Machines Corporation | Altering virtual content based on the presence of hazardous physical obstructions |
US11194836B2 (en) * | 2017-09-13 | 2021-12-07 | International Business Machines Corporation | Distributed data storage |
US10972579B2 (en) * | 2017-10-13 | 2021-04-06 | Nebbiolo Technologies, Inc. | Adaptive scheduling for edge devices and networks |
CA3082082A1 (en) | 2017-11-10 | 2019-05-16 | Lvis Corporation | Efficacy and/or therapeutic parameter recommendation using individual patient data and therapeutic brain network maps |
EP3522013B1 (en) * | 2018-02-01 | 2020-04-01 | Siemens Aktiengesellschaft | Method and system for migration of containers in a container orchestration platform between compute nodes |
US20190273779A1 (en) * | 2018-03-01 | 2019-09-05 | Hewlett Packard Enterprise Development Lp | Execution of software on a remote computing system |
US11086826B2 (en) | 2018-04-30 | 2021-08-10 | Nutanix, Inc. | Virtualized server systems and methods including domain joining techniques |
US11096225B2 (en) * | 2018-06-26 | 2021-08-17 | Idag Holdings, Inc. | Methods, apparatuses and systems directed to resource solicitation for Fog-RAN |
EP3820118A4 (en) * | 2018-07-06 | 2022-03-09 | Hyundai Motor Company | Resource management method and device |
US11194680B2 (en) | 2018-07-20 | 2021-12-07 | Nutanix, Inc. | Two node clusters recovery on a failure |
CN109474659B (en) * | 2018-09-11 | 2022-01-18 | 深圳市亿兆互联技术有限公司 | Intelligent tourist party management system based on LoRa |
US11150931B2 (en) * | 2018-10-30 | 2021-10-19 | Hewlett Packard Enterprise Development Lp | Virtual workload migrations |
US11770447B2 (en) | 2018-10-31 | 2023-09-26 | Nutanix, Inc. | Managing high-availability file servers |
US10540388B1 (en) * | 2018-11-02 | 2020-01-21 | International Business Machines Corporation | Location-aware intelligent data migration and delivery |
CN109347975B (en) * | 2018-11-18 | 2021-08-24 | 上海无线通信研究中心 | Internet of vehicles low-delay communication method, terminal and system |
EP3683742A1 (en) | 2019-01-18 | 2020-07-22 | Naver Corporation | Method for computing at least one itinerary from a departure location to an arrival location |
US11157543B2 (en) * | 2019-03-26 | 2021-10-26 | Rovi Guides, Inc. | Systems and methods for generating bandwidth constrained recommendations |
US11206306B2 (en) * | 2019-05-21 | 2021-12-21 | Cobalt Iron, Inc. | Analytics based cloud brokering of data protection operations system and method |
EP3745331A1 (en) * | 2019-05-29 | 2020-12-02 | Naver Corporation | Methods for preprocessing a set of non-scheduled lines within a multimodal transportation network of predetermined stations and for computing at least one itinerary from a departure location to an arrival location |
US11228551B1 (en) | 2020-02-12 | 2022-01-18 | Snap Inc. | Multiple gateway message exchange |
US11516167B2 (en) | 2020-03-05 | 2022-11-29 | Snap Inc. | Storing data based on device location |
US11184433B2 (en) * | 2020-03-31 | 2021-11-23 | Microsoft Technology Licensing, Llc | Container mobility based on border gateway protocol prefixes |
US11436117B2 (en) | 2020-05-08 | 2022-09-06 | International Business Machines Corporation | Context aware dynamic relative positioning of fog nodes in a fog computing ecosystem |
US11768809B2 (en) | 2020-05-08 | 2023-09-26 | Nutanix, Inc. | Managing incremental snapshots for fast leader node bring-up |
US11178527B1 (en) | 2020-05-12 | 2021-11-16 | International Business Machines Corporation | Method and apparatus for proactive data hinting through dedicated traffic channel of telecom network |
CN112073542B (en) * | 2020-11-12 | 2021-02-05 | 腾讯科技(深圳)有限公司 | Fog node scheduling method and device, computer equipment and storage medium |
US20230121238A1 (en) * | 2021-10-15 | 2023-04-20 | International Business Machines Corporation | Dynamic virtual network access |
US11588910B2 (en) * | 2022-03-14 | 2023-02-21 | Meta Platforms Technologies, Llc | Offloading visual frames to a gateway device |
US11880950B2 (en) | 2022-03-14 | 2024-01-23 | Meta Platforms Technologies, Llc | Selective offload of workloads to edge devices |
US11928038B2 (en) | 2022-06-21 | 2024-03-12 | International Business Machines Corporation | Managing data sets based on user activity |
US20240073155A1 (en) * | 2022-08-24 | 2024-02-29 | At&T Intellectual Property I, L.P. | System and method adapted to simplify user equipment requirements during travel |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101636967A (en) * | 2007-03-22 | 2010-01-27 | 微软公司 | The remote data access techniques that is used for portable set |
US20120214506A1 (en) * | 2011-02-22 | 2012-08-23 | Ole-Petter Skaaksrud | Systems and methods for geo-staging of sensor data through distributed global (cloud) architecture |
US20130073670A1 (en) * | 2011-09-15 | 2013-03-21 | Microsoft Corporation | Geo-Migration Of User State |
US20130144978A1 (en) * | 2011-12-02 | 2013-06-06 | International Business Machines Corporation | Data relocation in global storage cloud environments |
CN103297492A (en) * | 2012-02-07 | 2013-09-11 | 国际商业机器公司 | Migrating data between networked computing environments |
CN105164990A (en) * | 2013-03-18 | 2015-12-16 | 皇家Kpn公司 | Redirecting client device from first gateway to second gateway for accessing network node function |
US20150373108A1 (en) * | 2014-06-18 | 2015-12-24 | International Business Machines Corporation | Dynamic proximity based networked storage |
US20160132784A1 (en) * | 2012-02-21 | 2016-05-12 | Comcast Cable Communications, Llc | Moveable storage |
Family Cites Families (365)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5889896A (en) | 1994-02-09 | 1999-03-30 | Meshinsky; John | System for performing multiple processes on images of scanned documents |
US5812773A (en) | 1996-07-12 | 1998-09-22 | Microsoft Corporation | System and method for the distribution of hierarchically structured data |
US6108782A (en) | 1996-12-13 | 2000-08-22 | 3Com Corporation | Distributed remote monitoring (dRMON) for networks |
US6178453B1 (en) | 1997-02-18 | 2001-01-23 | Netspeak Corporation | Virtual circuit switching architecture |
US6298153B1 (en) | 1998-01-16 | 2001-10-02 | Canon Kabushiki Kaisha | Digital signature method and information communication system and apparatus using such method |
US6735631B1 (en) | 1998-02-10 | 2004-05-11 | Sprint Communications Company, L.P. | Method and system for networking redirecting |
US6643260B1 (en) | 1998-12-18 | 2003-11-04 | Cisco Technology, Inc. | Method and apparatus for implementing a quality of service policy in a data communications network |
US20040095237A1 (en) | 1999-01-09 | 2004-05-20 | Chen Kimball C. | Electronic message delivery system utilizable in the monitoring and control of remote equipment and method of same |
EP1096360B1 (en) | 1999-10-25 | 2004-09-22 | Texas Instruments Incorporated | Intelligent power management for distributed processing systems |
US6707794B1 (en) | 1999-11-15 | 2004-03-16 | Networks Associates Technology, Inc. | Method, system and computer program product for physical link layer handshake protocol analysis |
US6343290B1 (en) | 1999-12-22 | 2002-01-29 | Celeritas Technologies, L.L.C. | Geographic network management system |
US6683873B1 (en) | 1999-12-27 | 2004-01-27 | Cisco Technology, Inc. | Methods and apparatus for redirecting network traffic |
JP4162347B2 (en) | 2000-01-31 | 2008-10-08 | 富士通株式会社 | Network system |
US7058706B1 (en) | 2000-03-31 | 2006-06-06 | Akamai Technologies, Inc. | Method and apparatus for determining latency between multiple servers and a client |
US6721804B1 (en) | 2000-04-07 | 2004-04-13 | Danger, Inc. | Portal system for converting requested data into a bytecode format based on portal device's graphical capabilities |
WO2001092572A1 (en) | 2000-06-01 | 2001-12-06 | Nisshinbo Industries, Inc. | Kit and method for determining hla type |
US7917647B2 (en) | 2000-06-16 | 2011-03-29 | Mcafee, Inc. | Method and apparatus for rate limiting |
US7062571B1 (en) | 2000-06-30 | 2006-06-13 | Cisco Technology, Inc. | Efficient IP load-balancing traffic distribution using ternary CAMs |
US7051078B1 (en) | 2000-07-10 | 2006-05-23 | Cisco Technology, Inc. | Hierarchical associative memory-based classification system |
AU2001288463A1 (en) | 2000-08-30 | 2002-03-13 | Citibank, N.A. | Method and system for internet hosting and security |
US7596784B2 (en) | 2000-09-12 | 2009-09-29 | Symantec Operating Corporation | Method system and apparatus for providing pay-per-use distributed computing resources |
US6996615B1 (en) | 2000-09-29 | 2006-02-07 | Cisco Technology, Inc. | Highly scalable least connections load balancing |
US7054930B1 (en) | 2000-10-26 | 2006-05-30 | Cisco Technology, Inc. | System and method for propagating filters |
US20020143928A1 (en) | 2000-12-07 | 2002-10-03 | Maltz David A. | Method and system for collection and storage of traffic data in a computer network |
US7167965B2 (en) * | 2001-04-30 | 2007-01-23 | Hewlett-Packard Development Company, L.P. | Method and system for online data migration on storage systems with performance guarantees |
US7065482B2 (en) | 2001-05-17 | 2006-06-20 | International Business Machines Corporation | Internet traffic analysis tool |
US7002965B1 (en) | 2001-05-21 | 2006-02-21 | Cisco Technology, Inc. | Method and apparatus for using ternary and binary content-addressable memory stages to classify packets |
AU2002304227A1 (en) | 2001-06-11 | 2002-12-23 | Bluefire Security Technology | Packet filtering system and methods |
US7212490B1 (en) | 2001-07-06 | 2007-05-01 | Cisco Technology, Inc. | Dynamic load balancing for dual ring topology networks |
US7028098B2 (en) | 2001-07-20 | 2006-04-11 | Nokia, Inc. | Selective routing of data flows using a TCAM |
JP2003345612A (en) | 2002-05-28 | 2003-12-05 | Sony Corp | Arithmetic processing system, task control method on computer system, and computer program |
US8103755B2 (en) | 2002-07-02 | 2012-01-24 | Arbor Networks, Inc. | Apparatus and method for managing a provider network |
US7313667B1 (en) | 2002-08-05 | 2007-12-25 | Cisco Technology, Inc. | Methods and apparatus for mapping fields of entries into new values and combining these mapped values into mapped entries for use in lookup operations such as for packet processing |
US20040131059A1 (en) | 2002-09-19 | 2004-07-08 | Ram Ayyakad | Single-pass packet scan |
US7536476B1 (en) | 2002-12-20 | 2009-05-19 | Cisco Technology, Inc. | Method for performing tree based ACL lookups |
US6733449B1 (en) | 2003-03-20 | 2004-05-11 | Siemens Medical Solutions Usa, Inc. | System and method for real-time streaming of ultrasound data to a diagnostic medical ultrasound streaming application |
US7567504B2 (en) | 2003-06-30 | 2009-07-28 | Microsoft Corporation | Network load balancing with traffic routing |
US20050060418A1 (en) | 2003-09-17 | 2005-03-17 | Gennady Sorokopud | Packet classification |
US7474653B2 (en) | 2003-12-05 | 2009-01-06 | Hewlett-Packard Development Company, L.P. | Decision cache using multi-key lookup |
US7496661B1 (en) | 2004-03-29 | 2009-02-24 | Packeteer, Inc. | Adaptive, application-aware selection of differentiated network services |
EP1762076A2 (en) | 2004-06-25 | 2007-03-14 | Koninklijke Philips Electronics N.V. | Anonymous certificates with anonymous certificate show |
US7379846B1 (en) | 2004-06-29 | 2008-05-27 | Sun Microsystems, Inc. | System and method for automated problem diagnosis |
US7881957B1 (en) | 2004-11-16 | 2011-02-01 | Amazon Technologies, Inc. | Identifying tasks for task performers based on task subscriptions |
WO2006058065A2 (en) | 2004-11-23 | 2006-06-01 | Nighthawk Radiology Services | Methods and systems for providing data across a network |
US7548562B2 (en) | 2004-12-14 | 2009-06-16 | Agilent Technologies, Inc. | High speed acquisition system that allows capture from a packet network and streams the data to a storage medium |
US20060146825A1 (en) | 2004-12-30 | 2006-07-06 | Padcom, Inc. | Network based quality of service |
US7808897B1 (en) | 2005-03-01 | 2010-10-05 | International Business Machines Corporation | Fast network security utilizing intrusion prevention systems |
US20110016214A1 (en) | 2009-07-15 | 2011-01-20 | Cluster Resources, Inc. | System and method of brokering cloud computing resources |
WO2006107531A2 (en) | 2005-03-16 | 2006-10-12 | Cluster Resources, Inc. | Simple integration of an on-demand compute environment |
US9015324B2 (en) | 2005-03-16 | 2015-04-21 | Adaptive Computing Enterprises, Inc. | System and method of brokering cloud computing resources |
US7480672B2 (en) | 2005-03-31 | 2009-01-20 | Sap Ag | Multiple log queues in a database management system |
US7606147B2 (en) | 2005-04-13 | 2009-10-20 | Zeugma Systems Inc. | Application aware traffic shaping service node positioned between the access and core networks |
US9065727B1 (en) | 2012-08-31 | 2015-06-23 | Google Inc. | Device identifier similarity models derived from online event signals |
US11327674B2 (en) * | 2012-06-05 | 2022-05-10 | Pure Storage, Inc. | Storage vault tiering and data migration in a distributed storage network |
US7607043B2 (en) | 2006-01-04 | 2009-10-20 | International Business Machines Corporation | Analysis of mutually exclusive conflicts among redundant devices |
US7613955B2 (en) | 2006-01-06 | 2009-11-03 | Microsoft Corporation | Collecting debug data from a wireless device |
US8028071B1 (en) | 2006-02-15 | 2011-09-27 | Vmware, Inc. | TCP/IP offload engine virtualization system and methods |
US8040895B2 (en) | 2006-03-22 | 2011-10-18 | Cisco Technology, Inc. | Method and system for removing dead access control entries (ACEs) |
US7778183B2 (en) | 2006-03-31 | 2010-08-17 | International Business Machines Corporation | Data replica selector |
US20090019367A1 (en) | 2006-05-12 | 2009-01-15 | Convenos, Llc | Apparatus, system, method, and computer program product for collaboration via one or more networks |
US7761596B2 (en) | 2006-06-30 | 2010-07-20 | Telefonaktiebolaget L M Ericsson (Publ) | Router and method for server load balancing |
US8533687B1 (en) | 2009-11-30 | 2013-09-10 | dynaTrade Software GmbH | Methods and system for global real-time transaction tracing |
US8194664B2 (en) | 2006-10-10 | 2012-06-05 | Cisco Technology, Inc. | Two-level load-balancing of network traffic over an MPLS network |
US11496598B2 (en) * | 2006-12-11 | 2022-11-08 | International Business Machines Corporation | Caching data at network processing nodes based on device location |
JP4333736B2 (en) | 2006-12-19 | 2009-09-16 | 村田機械株式会社 | Relay server and client terminal |
US7653063B2 (en) | 2007-01-05 | 2010-01-26 | Cisco Technology, Inc. | Source address binding check |
US8103773B2 (en) | 2007-01-19 | 2012-01-24 | Cisco Technology, Inc. | Transactional application processing in a distributed environment |
US8176486B2 (en) | 2007-02-15 | 2012-05-08 | Clearcube Technology, Inc. | Maintaining a pool of free virtual machines on a server computer |
US8406141B1 (en) | 2007-03-12 | 2013-03-26 | Cybertap, Llc | Network search methods and systems |
US7853998B2 (en) | 2007-03-22 | 2010-12-14 | Mocana Corporation | Firewall propagation |
US7773510B2 (en) | 2007-05-25 | 2010-08-10 | Zeugma Systems Inc. | Application routing in a distributed compute environment |
US9678803B2 (en) | 2007-06-22 | 2017-06-13 | Red Hat, Inc. | Migration of network entities to a cloud infrastructure |
US9477572B2 (en) | 2007-06-22 | 2016-10-25 | Red Hat, Inc. | Performing predictive modeling of virtual machine relationships |
US8301740B2 (en) | 2007-06-27 | 2012-10-30 | Ca, Inc. | Autonomic control of a distributed computing system using dynamically assembled resource chains |
US8205208B2 (en) | 2007-07-24 | 2012-06-19 | Internaitonal Business Machines Corporation | Scheduling grid jobs using dynamic grid scheduling policy |
US8423470B2 (en) | 2007-09-21 | 2013-04-16 | Microsoft Corporation | Distributed secure anonymous conferencing |
US7769767B2 (en) * | 2007-09-27 | 2010-08-03 | Domingo Enterprises, Llc | System and method for filtering content on a mobile device based on contextual tagging |
US8284664B1 (en) | 2007-09-28 | 2012-10-09 | Juniper Networks, Inc. | Redirecting data units to service modules based on service tags and a redirection table |
US8121117B1 (en) | 2007-10-01 | 2012-02-21 | F5 Networks, Inc. | Application layer network traffic prioritization |
US8862765B2 (en) | 2007-10-18 | 2014-10-14 | Arris Solutions, Inc. | Fair bandwidth redistribution algorithm |
US8583797B2 (en) | 2008-01-07 | 2013-11-12 | Ca, Inc. | Interdependent capacity levels of resources in a distributed computing system |
US20090178058A1 (en) | 2008-01-09 | 2009-07-09 | Microsoft Corporation | Application Aware Networking |
US8291474B2 (en) | 2008-04-16 | 2012-10-16 | Oracle America, Inc. | Using opaque groups in a federated identity management environment |
US8320916B2 (en) * | 2008-05-20 | 2012-11-27 | Alcatel Lucent | Method and apparatus for pre-fetching data in a mobile network environment using edge data storage |
US8935692B2 (en) | 2008-05-22 | 2015-01-13 | Red Hat, Inc. | Self-management of virtual machines in cloud-based networks |
US8943497B2 (en) | 2008-05-29 | 2015-01-27 | Red Hat, Inc. | Managing subscriptions for cloud-based virtual machines |
US8171415B2 (en) | 2008-06-11 | 2012-05-01 | International Business Machines Corporation | Outage management portal leveraging back-end resources to create a role and user tailored front-end interface for coordinating outage responses |
US8429675B1 (en) | 2008-06-13 | 2013-04-23 | Netapp, Inc. | Virtual machine communication |
US9069599B2 (en) | 2008-06-19 | 2015-06-30 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer with security zone facilities |
AU2009259876A1 (en) | 2008-06-19 | 2009-12-23 | Servicemesh, Inc. | Cloud computing gateway, cloud computing hypervisor, and methods for implementing same |
US8175103B2 (en) | 2008-06-26 | 2012-05-08 | Rockstar Bidco, LP | Dynamic networking of virtual machines |
US8479192B2 (en) | 2008-06-27 | 2013-07-02 | Xerox Corporation | Dynamic XPS filter |
US8250215B2 (en) | 2008-08-12 | 2012-08-21 | Sap Ag | Method and system for intelligently leveraging cloud computing resources |
US8706878B1 (en) | 2008-08-21 | 2014-04-22 | United Services Automobile Association | Preferential loading in data centers |
US8234522B2 (en) | 2008-09-04 | 2012-07-31 | Telcordia Technologies, Inc. | Computing diagnostic explanations of network faults from monitoring data |
US8238256B2 (en) | 2008-09-08 | 2012-08-07 | Nugent Raymond M | System and method for cloud computing |
US8041714B2 (en) | 2008-09-15 | 2011-10-18 | Palantir Technologies, Inc. | Filter chains with associated views for exploring large data sets |
CN101394360B (en) | 2008-11-10 | 2011-07-20 | 北京星网锐捷网络技术有限公司 | Processing method, access device and communication system for address resolution protocol |
US9621341B2 (en) | 2008-11-26 | 2017-04-11 | Microsoft Technology Licensing, Llc | Anonymous verifiable public key certificates |
EP2211502A1 (en) | 2009-01-22 | 2010-07-28 | IBBT vzw | Management system and method for configuring a network for transferring media data |
US8566362B2 (en) | 2009-01-23 | 2013-10-22 | Nasuni Corporation | Method and system for versioned file system using structured data representations |
US20120005724A1 (en) | 2009-02-09 | 2012-01-05 | Imera Systems, Inc. | Method and system for protecting private enterprise resources in a cloud computing environment |
US8510735B2 (en) | 2009-02-11 | 2013-08-13 | International Business Machines Corporation | Runtime environment for virtualizing information technology appliances |
US8341427B2 (en) | 2009-02-16 | 2012-12-25 | Microsoft Corporation | Trusted cloud computing and services framework |
US9473555B2 (en) | 2012-12-31 | 2016-10-18 | The Nielsen Company (Us), Llc | Apparatus, system and methods for portable device tracking using temporary privileged access |
EP2228719A1 (en) | 2009-03-11 | 2010-09-15 | Zimory GmbH | Method of executing a virtual machine, computing system and computer program |
US8271615B2 (en) | 2009-03-31 | 2012-09-18 | Cloud Connex, Llc | Centrally managing and monitoring software as a service (SaaS) applications |
US8560639B2 (en) | 2009-04-24 | 2013-10-15 | Microsoft Corporation | Dynamic placement of replica data |
US8516106B2 (en) | 2009-05-18 | 2013-08-20 | International Business Machines Corporation | Use tag clouds to visualize components related to an event |
TW201112006A (en) | 2009-05-29 | 2011-04-01 | Ibm | Computer system, method and program product |
US8639787B2 (en) | 2009-06-01 | 2014-01-28 | Oracle International Corporation | System and method for creating or reconfiguring a virtual server image for cloud deployment |
US20100318609A1 (en) | 2009-06-15 | 2010-12-16 | Microsoft Corporation | Bridging enterprise networks into cloud |
KR101626117B1 (en) | 2009-06-22 | 2016-05-31 | 삼성전자주식회사 | Client, brokerage sever and method for providing cloud storage |
US8281149B2 (en) | 2009-06-23 | 2012-10-02 | Google Inc. | Privacy-preserving flexible anonymous-pseudonymous access |
US8244559B2 (en) | 2009-06-26 | 2012-08-14 | Microsoft Corporation | Cloud computing resource broker |
US8612439B2 (en) | 2009-06-30 | 2013-12-17 | Commvault Systems, Inc. | Performing data storage operations in a cloud storage environment, including searching, encryption and indexing |
US8234377B2 (en) | 2009-07-22 | 2012-07-31 | Amazon Technologies, Inc. | Dynamically migrating computer networks |
US8966475B2 (en) | 2009-08-10 | 2015-02-24 | Novell, Inc. | Workload management for heterogeneous hosts in a computing system environment |
US8271653B2 (en) | 2009-08-31 | 2012-09-18 | Red Hat, Inc. | Methods and systems for cloud management using multiple cloud management schemes to allow communication between independently controlled clouds |
US8510469B2 (en) | 2009-08-31 | 2013-08-13 | Cisco Technology, Inc. | Measuring attributes of client-server applications |
US8862720B2 (en) | 2009-08-31 | 2014-10-14 | Red Hat, Inc. | Flexible cloud management including external clouds |
US20110072489A1 (en) | 2009-09-23 | 2011-03-24 | Gilad Parann-Nissany | Methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management |
JP2011076292A (en) | 2009-09-30 | 2011-04-14 | Hitachi Ltd | Method for designing failure cause analysis rule in accordance with available device information, and computer |
US8532108B2 (en) | 2009-09-30 | 2013-09-10 | Alcatel Lucent | Layer 2 seamless site extension of enterprises in cloud computing |
US8880682B2 (en) | 2009-10-06 | 2014-11-04 | Emc Corporation | Integrated forensics platform for analyzing IT resources consumed to derive operational and architectural recommendations |
US8812490B1 (en) * | 2009-10-30 | 2014-08-19 | Microstrategy Incorporated | Data source joins |
US20110110382A1 (en) | 2009-11-10 | 2011-05-12 | Cisco Technology, Inc., A Corporation Of California | Distribution of Packets Among PortChannel Groups of PortChannel Links |
US8611356B2 (en) | 2009-11-13 | 2013-12-17 | Exalt Communications Incorporated | Apparatus for ethernet traffic aggregation of radio links |
US20110126197A1 (en) | 2009-11-25 | 2011-05-26 | Novell, Inc. | System and method for controlling cloud and virtualized data centers in an intelligent workload management system |
CN101719930A (en) | 2009-11-27 | 2010-06-02 | 南京邮电大学 | Cloud money-based hierarchical cloud computing system excitation method |
GB2475897A (en) | 2009-12-04 | 2011-06-08 | Creme Software Ltd | Resource allocation using estimated time to complete jobs in a grid or cloud computing environment |
US8037187B2 (en) | 2009-12-11 | 2011-10-11 | International Business Machines Corporation | Resource exchange management within a cloud computing environment |
US20130117337A1 (en) | 2009-12-23 | 2013-05-09 | Gary M. Dunham | Locally Connected Cloud Storage Device |
US9959147B2 (en) | 2010-01-13 | 2018-05-01 | Vmware, Inc. | Cluster configuration through host ranking |
US9883008B2 (en) | 2010-01-15 | 2018-01-30 | Endurance International Group, Inc. | Virtualization of multiple distinct website hosting architectures |
WO2011091056A1 (en) | 2010-01-19 | 2011-07-28 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer |
US8301746B2 (en) | 2010-01-26 | 2012-10-30 | International Business Machines Corporation | Method and system for abstracting non-functional requirements based deployment of virtual machines |
US8898457B2 (en) | 2010-02-26 | 2014-11-25 | Red Hat, Inc. | Automatically generating a certificate operation request |
US9129086B2 (en) | 2010-03-04 | 2015-09-08 | International Business Machines Corporation | Providing security services within a cloud computing environment |
US20110239039A1 (en) | 2010-03-26 | 2011-09-29 | Dieffenbach Devon C | Cloud computing enabled robust initialization and recovery of it services |
US20110252327A1 (en) | 2010-03-26 | 2011-10-13 | Actiance, Inc. | Methods, systems, and user interfaces for graphical summaries of network activities |
US8886806B2 (en) | 2010-04-07 | 2014-11-11 | Accenture Global Services Limited | Generic control layer in a cloud environment |
US8243598B2 (en) | 2010-04-26 | 2012-08-14 | International Business Machines Corporation | Load-balancing via modulus distribution and TCP flow redirection due to server overload |
US8345692B2 (en) | 2010-04-27 | 2013-01-01 | Cisco Technology, Inc. | Virtual switching overlay for cloud computing |
US8547974B1 (en) | 2010-05-05 | 2013-10-01 | Mu Dynamics | Generating communication protocol test cases based on network traffic |
US8719804B2 (en) | 2010-05-05 | 2014-05-06 | Microsoft Corporation | Managing runtime execution of applications on cloud computing systems |
US8688792B2 (en) | 2010-05-06 | 2014-04-01 | Nec Laboratories America, Inc. | Methods and systems for discovering configuration data |
US8910278B2 (en) | 2010-05-18 | 2014-12-09 | Cloudnexa | Managing services in a cloud computing environment |
CN102255933B (en) | 2010-05-20 | 2016-03-30 | 中兴通讯股份有限公司 | Cloud service intermediary, cloud computing method and cloud system |
US8954564B2 (en) | 2010-05-28 | 2015-02-10 | Red Hat, Inc. | Cross-cloud vendor mapping service in cloud marketplace |
US8477610B2 (en) | 2010-05-31 | 2013-07-02 | Microsoft Corporation | Applying policies to schedule network bandwidth among virtual machines |
WO2011152910A1 (en) | 2010-06-02 | 2011-12-08 | Vmware, Inc. | Securing customer virtual machines in a multi-tenant cloud |
US8352415B2 (en) | 2010-06-15 | 2013-01-08 | International Business Machines Corporation | Converting images in virtual environments |
US8705395B2 (en) | 2010-06-15 | 2014-04-22 | Jds Uniphase Corporation | Method for time aware inline remote mirroring |
US8135979B2 (en) | 2010-06-24 | 2012-03-13 | Hewlett-Packard Development Company, L.P. | Collecting network-level packets into a data structure in response to an abnormal condition |
US9201701B2 (en) | 2010-07-16 | 2015-12-01 | Nokia Technologies Oy | Method and apparatus for distributing computation closures |
TWM394537U (en) | 2010-08-17 | 2010-12-11 | Chunghwa Telecom Co Ltd | A system for providing web cloud integrated services |
US8473557B2 (en) | 2010-08-24 | 2013-06-25 | At&T Intellectual Property I, L.P. | Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network |
US8656023B1 (en) | 2010-08-26 | 2014-02-18 | Adobe Systems Incorporated | Optimization scheduler for deploying applications on a cloud |
US9311158B2 (en) | 2010-09-03 | 2016-04-12 | Adobe Systems Incorporated | Determining a work distribution model between a client device and a cloud for an application deployed on the cloud |
US8539597B2 (en) | 2010-09-16 | 2013-09-17 | International Business Machines Corporation | Securing sensitive data for cloud computing |
US8572241B2 (en) | 2010-09-17 | 2013-10-29 | Microsoft Corporation | Integrating external and cluster heat map data |
US8413145B2 (en) | 2010-09-30 | 2013-04-02 | Avaya Inc. | Method and apparatus for efficient memory replication for high availability (HA) protection of a virtual machine (VM) |
US9128626B2 (en) | 2010-10-01 | 2015-09-08 | Peter Chacko | Distributed virtual storage cloud architecture and a method thereof |
US9110727B2 (en) | 2010-10-05 | 2015-08-18 | Unisys Corporation | Automatic replication of virtual machines |
EP2439637A1 (en) | 2010-10-07 | 2012-04-11 | Deutsche Telekom AG | Method and system of providing access to a virtual machine distributed in a hybrid cloud network |
US8797867B1 (en) | 2010-10-18 | 2014-08-05 | Juniper Networks, Inc. | Generating and enforcing a holistic quality of service policy in a network |
US9075661B2 (en) | 2010-10-20 | 2015-07-07 | Microsoft Technology Licensing, Llc | Placing objects on hosts using hard and soft constraints |
US8909744B2 (en) | 2010-10-20 | 2014-12-09 | Hcl Technologies Limited | System and method for transitioning to cloud computing environment |
US8589355B2 (en) * | 2010-10-29 | 2013-11-19 | International Business Machines Corporation | Data storage in a cloud |
US8407413B1 (en) | 2010-11-05 | 2013-03-26 | Netapp, Inc | Hardware flow classification for data storage services |
US8612615B2 (en) | 2010-11-23 | 2013-12-17 | Red Hat, Inc. | Systems and methods for identifying usage histories for producing optimized cloud utilization |
JP5725812B2 (en) | 2010-11-25 | 2015-05-27 | キヤノン株式会社 | Document processing apparatus, document processing method, and program |
US8560792B2 (en) | 2010-12-16 | 2013-10-15 | International Business Machines Corporation | Synchronous extent migration protocol for paired storage |
US10176018B2 (en) | 2010-12-21 | 2019-01-08 | Intel Corporation | Virtual core abstraction for cloud computing |
US8495356B2 (en) | 2010-12-31 | 2013-07-23 | International Business Machines Corporation | System for securing virtual machine disks on a remote shared storage subsystem |
US8935383B2 (en) | 2010-12-31 | 2015-01-13 | Verisign, Inc. | Systems, apparatus, and methods for network data analysis |
US20120179909A1 (en) | 2011-01-06 | 2012-07-12 | Pitney Bowes Inc. | Systems and methods for providing individual electronic document secure storage, retrieval and use |
US8448171B2 (en) | 2011-01-07 | 2013-05-21 | International Business Machines Corporation | Communications between virtual machines that have been migrated |
US20120182891A1 (en) | 2011-01-19 | 2012-07-19 | Youngseok Lee | Packet analysis system and method using hadoop based parallel computation |
US9225554B2 (en) | 2011-01-26 | 2015-12-29 | Cisco Technology, Inc. | Device-health-based dynamic configuration of network management systems suited for network operations |
US8619568B2 (en) | 2011-02-04 | 2013-12-31 | Cisco Technology, Inc. | Reassignment of distributed packet flows |
US9009697B2 (en) | 2011-02-08 | 2015-04-14 | International Business Machines Corporation | Hybrid cloud integrator |
US9063789B2 (en) | 2011-02-08 | 2015-06-23 | International Business Machines Corporation | Hybrid cloud integrator plug-in components |
US8805951B1 (en) | 2011-02-08 | 2014-08-12 | Emc Corporation | Virtual machines and cloud storage caching for cloud computing applications |
US8832818B2 (en) | 2011-02-28 | 2014-09-09 | Rackspace Us, Inc. | Automated hybrid connections between multiple environments in a data center |
US20120236716A1 (en) | 2011-03-14 | 2012-09-20 | Atheros Communications, Inc. | Profile-based quality of service for wireless communication systems |
KR101544482B1 (en) | 2011-03-15 | 2015-08-21 | 주식회사 케이티 | Cloud center controlling apparatus and cloud center selecting method of the same |
US9100188B2 (en) | 2011-04-18 | 2015-08-04 | Bank Of America Corporation | Hardware-based root of trust for cloud environments |
KR101544485B1 (en) | 2011-04-25 | 2015-08-17 | 주식회사 케이티 | Method and apparatus for selecting a node to place a replica in cloud storage system |
US8869244B1 (en) | 2011-05-03 | 2014-10-21 | Symantec Corporation | Techniques for providing role-based access control using dynamic shared accounts |
US8806015B2 (en) | 2011-05-04 | 2014-08-12 | International Business Machines Corporation | Workload-aware placement in private heterogeneous clouds |
US9253252B2 (en) | 2011-05-06 | 2016-02-02 | Citrix Systems, Inc. | Systems and methods for cloud bridging between intranet resources and cloud resources |
US9253159B2 (en) | 2011-05-06 | 2016-02-02 | Citrix Systems, Inc. | Systems and methods for cloud bridging between public and private clouds |
US8977754B2 (en) | 2011-05-09 | 2015-03-10 | Metacloud Inc. | Composite public cloud, method and system |
US8590050B2 (en) | 2011-05-11 | 2013-11-19 | International Business Machines Corporation | Security compliant data storage management |
CN102164091B (en) | 2011-05-13 | 2015-01-21 | 北京星网锐捷网络技术有限公司 | Method for building MAC (Media Access Control) address table and provider edge device |
US8719627B2 (en) | 2011-05-20 | 2014-05-06 | Microsoft Corporation | Cross-cloud computing for capacity management and disaster recovery |
US9244751B2 (en) | 2011-05-31 | 2016-01-26 | Hewlett Packard Enterprise Development Lp | Estimating a performance parameter of a job having map and reduce tasks after a failure |
US8984104B2 (en) | 2011-05-31 | 2015-03-17 | Red Hat, Inc. | Self-moving operating system installation in cloud-based network |
US9104460B2 (en) | 2011-05-31 | 2015-08-11 | Red Hat, Inc. | Inter-cloud live migration of virtualization systems |
US8959526B2 (en) | 2011-06-09 | 2015-02-17 | Microsoft Corporation | Scheduling execution of complementary jobs based on resource usage |
US8806003B2 (en) | 2011-06-14 | 2014-08-12 | International Business Machines Corporation | Forecasting capacity available for processing workloads in a networked computing environment |
US8547975B2 (en) | 2011-06-28 | 2013-10-01 | Verisign, Inc. | Parallel processing for multiple instance real-time monitoring |
US8589543B2 (en) | 2011-07-01 | 2013-11-19 | Cisco Technology, Inc. | Virtual data center monitoring |
US8959003B2 (en) | 2011-07-07 | 2015-02-17 | International Business Machines Corporation | Interactive data visualization for trend analysis |
US20130036213A1 (en) | 2011-08-02 | 2013-02-07 | Masum Hasan | Virtual private clouds |
US9300539B2 (en) * | 2011-08-04 | 2016-03-29 | International Business Machines Corporation | Network computing management |
US8958298B2 (en) | 2011-08-17 | 2015-02-17 | Nicira, Inc. | Centralized logical L3 routing |
US20140156557A1 (en) | 2011-08-19 | 2014-06-05 | Jun Zeng | Providing a Simulation Service by a Cloud-Based Infrastructure |
US8630291B2 (en) | 2011-08-22 | 2014-01-14 | Cisco Technology, Inc. | Dynamic multi-path forwarding for shared-media communication networks |
EP2674865A4 (en) | 2011-09-26 | 2016-06-01 | Hitachi Ltd | MANAGEMENT COMPUTER AND METHOD FOR ROOT CAUSE ANALYSiS |
CN103023762A (en) | 2011-09-27 | 2013-04-03 | 阿尔卡特朗讯公司 | Cloud computing access gateway and method for providing access to cloud provider for user terminal |
US9250941B2 (en) | 2011-09-30 | 2016-02-02 | Telefonaktiebolaget L M Ericsson (Publ) | Apparatus and method for segregating tenant specific data when using MPLS in openflow-enabled cloud computing |
US8560663B2 (en) | 2011-09-30 | 2013-10-15 | Telefonaktiebolaget L M Ericsson (Publ) | Using MPLS for virtual private cloud network isolation in openflow-enabled cloud computing |
US20130091557A1 (en) | 2011-10-11 | 2013-04-11 | Wheel Innovationz, Inc. | System and method for providing cloud-based cross-platform application stores for mobile computing devices |
DE102012217202B4 (en) | 2011-10-12 | 2020-06-18 | International Business Machines Corporation | Method and system for optimizing the placement of virtual machines in cloud computing environments |
US9201690B2 (en) | 2011-10-21 | 2015-12-01 | International Business Machines Corporation | Resource aware scheduling in a distributed computing environment |
US8789179B2 (en) | 2011-10-28 | 2014-07-22 | Novell, Inc. | Cloud protection techniques |
US9311160B2 (en) | 2011-11-10 | 2016-04-12 | Verizon Patent And Licensing Inc. | Elastic cloud networking |
US8832249B2 (en) | 2011-11-30 | 2014-09-09 | At&T Intellectual Property I, L.P. | Methods and apparatus to adjust resource allocation in a distributive computing network |
US20130152076A1 (en) | 2011-12-07 | 2013-06-13 | Cisco Technology, Inc. | Network Access Control Policy for Virtual Machine Migration |
US9113376B2 (en) | 2011-12-09 | 2015-08-18 | Cisco Technology, Inc. | Multi-interface mobility |
US8694995B2 (en) | 2011-12-14 | 2014-04-08 | International Business Machines Corporation | Application initiated negotiations for resources meeting a performance parameter in a virtualized computing environment |
US8832262B2 (en) | 2011-12-15 | 2014-09-09 | Cisco Technology, Inc. | Normalizing network performance indexes |
US10134056B2 (en) | 2011-12-16 | 2018-11-20 | Ebay Inc. | Systems and methods for providing information based on location |
US8860777B2 (en) | 2011-12-22 | 2014-10-14 | Verizon Patent And Licensing Inc. | Multi-enterprise video conference service |
US8547379B2 (en) | 2011-12-29 | 2013-10-01 | Joyent, Inc. | Systems, methods, and media for generating multidimensional heat maps |
US20130173796A1 (en) * | 2011-12-30 | 2013-07-04 | United Video Properties, Inc. | Systems and methods for managing a media content queue |
US8555339B2 (en) | 2012-01-06 | 2013-10-08 | International Business Machines Corporation | Identifying guests in web meetings |
US8908698B2 (en) | 2012-01-13 | 2014-12-09 | Cisco Technology, Inc. | System and method for managing site-to-site VPNs of a cloud managed network |
US8732291B2 (en) | 2012-01-13 | 2014-05-20 | Accenture Global Services Limited | Performance interference model for managing consolidated workloads in QOS-aware clouds |
US9529348B2 (en) | 2012-01-24 | 2016-12-27 | Emerson Process Management Power & Water Solutions, Inc. | Method and apparatus for deploying industrial plant simulators using cloud computing technologies |
US9900231B2 (en) | 2012-01-27 | 2018-02-20 | Microsoft Technology Licensing, Llc | Managing data transfers over network connections based on priority and a data usage plan |
US8660129B1 (en) | 2012-02-02 | 2014-02-25 | Cisco Technology, Inc. | Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (IaaS) on hybrid cloud networks |
US9451303B2 (en) | 2012-02-27 | 2016-09-20 | The Nielsen Company (Us), Llc | Method and system for gathering and computing an audience's neurologically-based reactions in a distributed framework involving remote storage and computing |
US10097406B2 (en) | 2012-03-19 | 2018-10-09 | Level 3 Communications, Llc | Systems and methods for data mobility with a cloud architecture |
US9350671B2 (en) | 2012-03-22 | 2016-05-24 | Futurewei Technologies, Inc. | Supporting software defined networking with application layer traffic optimization |
US20130254415A1 (en) | 2012-03-26 | 2013-09-26 | F. Brian Fullen | Routing requests over a network |
EP2645257A3 (en) | 2012-03-29 | 2014-06-18 | Prelert Ltd. | System and method for visualisation of behaviour within computer infrastructure |
FR2988943A1 (en) | 2012-03-29 | 2013-10-04 | France Telecom | SYSTEM FOR SUPERVISING THE SAFETY OF AN ARCHITECTURE |
US8930747B2 (en) | 2012-03-30 | 2015-01-06 | Sungard Availability Services, Lp | Private cloud replication and recovery |
US9164795B1 (en) | 2012-03-30 | 2015-10-20 | Amazon Technologies, Inc. | Secure tunnel infrastructure between hosts in a hybrid network environment |
US9313048B2 (en) | 2012-04-04 | 2016-04-12 | Cisco Technology, Inc. | Location aware virtual service provisioning in a hybrid cloud environment |
US8856339B2 (en) | 2012-04-04 | 2014-10-07 | Cisco Technology, Inc. | Automatically scaled network overlay with heuristic monitoring in a hybrid cloud environment |
US9201704B2 (en) | 2012-04-05 | 2015-12-01 | Cisco Technology, Inc. | System and method for migrating application virtual machines in a network environment |
US8775576B2 (en) | 2012-04-17 | 2014-07-08 | Nimbix, Inc. | Reconfigurable cloud computing |
US9203784B2 (en) | 2012-04-24 | 2015-12-01 | Cisco Technology, Inc. | Distributed virtual switch architecture for a hybrid cloud |
US8918510B2 (en) | 2012-04-27 | 2014-12-23 | Hewlett-Packard Development Company, L. P. | Evaluation of cloud computing services |
US9223634B2 (en) | 2012-05-02 | 2015-12-29 | Cisco Technology, Inc. | System and method for simulating virtual machine migration in a network environment |
WO2013186870A1 (en) | 2012-06-13 | 2013-12-19 | 株式会社日立製作所 | Service monitoring system and service monitoring method |
US9183031B2 (en) | 2012-06-19 | 2015-11-10 | Bank Of America Corporation | Provisioning of a virtual machine by using a secured zone of a cloud environment |
US8938775B1 (en) | 2012-06-27 | 2015-01-20 | Amazon Technologies, Inc. | Dynamic data loss prevention in a multi-tenant environment |
US9215131B2 (en) | 2012-06-29 | 2015-12-15 | Cisco Technology, Inc. | Methods for exchanging network management messages using UDP over HTTP protocol |
US8909857B2 (en) | 2012-06-29 | 2014-12-09 | Broadcom Corporation | Efficient storage of ACL frequent ranges in a ternary memory |
US20140006585A1 (en) | 2012-06-29 | 2014-01-02 | Futurewei Technologies, Inc. | Providing Mobility in Overlay Networks |
US20140052877A1 (en) | 2012-08-16 | 2014-02-20 | Wenbo Mao | Method and apparatus for tenant programmable logical network for multi-tenancy cloud datacenters |
US9167050B2 (en) | 2012-08-16 | 2015-10-20 | Futurewei Technologies, Inc. | Control pool based enterprise policy enabler for controlled cloud access |
US9582221B2 (en) | 2012-08-24 | 2017-02-28 | Vmware, Inc. | Virtualization-aware data locality in distributed data processing |
US9047181B2 (en) | 2012-09-07 | 2015-06-02 | Splunk Inc. | Visualization of data from clusters |
US10097378B2 (en) | 2012-09-07 | 2018-10-09 | Cisco Technology, Inc. | Efficient TCAM resource sharing |
US9069979B2 (en) | 2012-09-07 | 2015-06-30 | Oracle International Corporation | LDAP-based multi-tenant in-cloud identity management system |
US9634922B2 (en) | 2012-09-11 | 2017-04-25 | Board Of Regents Of The Nevada System Of Higher Education, On Behalf Of The University Of Nevada, Reno | Apparatus, system, and method for cloud-assisted routing |
US9383900B2 (en) | 2012-09-12 | 2016-07-05 | International Business Machines Corporation | Enabling real-time operational environment conformity to an enterprise model |
US9141637B2 (en) * | 2012-09-26 | 2015-09-22 | International Business Machines Corporation | Predictive data management in a networked computing environment |
US8924720B2 (en) | 2012-09-27 | 2014-12-30 | Intel Corporation | Method and system to securely migrate and provision virtual machine images and content |
US8850182B1 (en) | 2012-09-28 | 2014-09-30 | Shoretel, Inc. | Data capture for secure protocols |
US9301205B2 (en) | 2012-10-04 | 2016-03-29 | Benu Networks, Inc. | Application and content awareness for self optimizing networks |
CN104903799B (en) | 2012-10-08 | 2018-05-22 | 费希尔-罗斯蒙特系统公司 | Configurable user in Process Control System shows |
US9424437B1 (en) | 2012-10-12 | 2016-08-23 | Egnyte, Inc. | Systems and methods for providing file access in a hybrid cloud storage system |
US9361192B2 (en) | 2012-10-19 | 2016-06-07 | Oracle International Corporation | Method and apparatus for restoring an instance of a storage server |
US9264478B2 (en) | 2012-10-30 | 2016-02-16 | Microsoft Technology Licensing, Llc | Home cloud with virtualized input and output roaming over network |
US9424228B2 (en) | 2012-11-01 | 2016-08-23 | Ezchip Technologies Ltd. | High performance, scalable multi chip interconnect |
US9442954B2 (en) | 2012-11-12 | 2016-09-13 | Datawise Systems | Method and apparatus for achieving optimal resource allocation dynamically in a distributed computing environment |
US20140140211A1 (en) | 2012-11-16 | 2014-05-22 | Cisco Technology, Inc. | Classification of traffic for application aware policies in a wireless network |
US9398436B2 (en) | 2012-11-21 | 2016-07-19 | Acer Incorporated | Cloud service for making social connections |
US9049115B2 (en) | 2012-12-13 | 2015-06-02 | Cisco Technology, Inc. | Enabling virtual workloads using overlay technologies to interoperate with physical network services |
US9268808B2 (en) | 2012-12-31 | 2016-02-23 | Facebook, Inc. | Placement policy |
US9122510B2 (en) | 2013-01-02 | 2015-09-01 | International Business Machines Corporation | Querying and managing computing resources in a networked computing environment |
CN105144652A (en) | 2013-01-24 | 2015-12-09 | 惠普发展公司,有限责任合伙企业 | Address resolution in software-defined networks |
US20140215471A1 (en) | 2013-01-28 | 2014-07-31 | Hewlett-Packard Development Company, L.P. | Creating a model relating to execution of a job on platforms |
US9274818B2 (en) | 2013-02-06 | 2016-03-01 | International Business Machines Corporation | Reliable and scalable image transfer for data centers with low connectivity using redundancy detection |
US9525564B2 (en) | 2013-02-26 | 2016-12-20 | Zentera Systems, Inc. | Secure virtual network platform for enterprise hybrid cloud computing environments |
US9183016B2 (en) | 2013-02-27 | 2015-11-10 | Vmware, Inc. | Adaptive task scheduling of Hadoop in a virtualized environment |
US9251115B2 (en) | 2013-03-07 | 2016-02-02 | Citrix Systems, Inc. | Dynamic configuration in cloud computing environments |
US9043439B2 (en) | 2013-03-14 | 2015-05-26 | Cisco Technology, Inc. | Method for streaming packet captures from network access devices to a cloud server over HTTP |
US9244775B2 (en) | 2013-03-14 | 2016-01-26 | International Business Machines Corporation | Reducing reading of database logs by persisting long-running transaction data |
US9027087B2 (en) | 2013-03-14 | 2015-05-05 | Rackspace Us, Inc. | Method and system for identity-based authentication of virtual machines |
US20140280964A1 (en) | 2013-03-15 | 2014-09-18 | Gravitant, Inc. | Systems, methods and computer readable mediums for implementing cloud service brokerage platform functionalities |
US8954992B2 (en) | 2013-03-15 | 2015-02-10 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Distributed and scaled-out network switch and packet processing |
JP5983484B2 (en) | 2013-03-21 | 2016-08-31 | 富士通株式会社 | Information processing system, control program for controlling information processing apparatus, and control method for information processing system |
WO2014165601A1 (en) | 2013-04-02 | 2014-10-09 | Orbis Technologies, Inc. | Data center analytics and dashboard |
US9438495B2 (en) | 2013-04-02 | 2016-09-06 | Amazon Technologies, Inc. | Visualization of resources in a data center |
US9973375B2 (en) | 2013-04-22 | 2018-05-15 | Cisco Technology, Inc. | App store portal providing point-and-click deployment of third-party virtualized network functions |
US9397929B2 (en) | 2013-04-22 | 2016-07-19 | Ciena Corporation | Forwarding multicast packets over different layer-2 segments |
US9407540B2 (en) | 2013-09-06 | 2016-08-02 | Cisco Technology, Inc. | Distributed service chaining in a network environment |
US20140366155A1 (en) | 2013-06-11 | 2014-12-11 | Cisco Technology, Inc. | Method and system of providing storage services in multiple public clouds |
US9621642B2 (en) | 2013-06-17 | 2017-04-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods of forwarding data packets using transient tables and related load balancers |
US9632858B2 (en) | 2013-07-28 | 2017-04-25 | OpsClarity Inc. | Organizing network performance metrics into historical anomaly dependency data |
US9426060B2 (en) | 2013-08-07 | 2016-08-23 | International Business Machines Corporation | Software defined network (SDN) switch clusters having layer-3 distributed router functionality |
US9311140B2 (en) | 2013-08-13 | 2016-04-12 | Vmware, Inc. | Method and apparatus for extending local area networks between clouds and migrating virtual machines using static network addresses |
US9338223B2 (en) | 2013-08-14 | 2016-05-10 | Verizon Patent And Licensing Inc. | Private cloud topology management system |
US9043576B2 (en) | 2013-08-21 | 2015-05-26 | Simplivity Corporation | System and method for virtual machine conversion |
US9686154B2 (en) | 2013-08-21 | 2017-06-20 | International Business Machines Corporation | Generating a service-catalog entry from discovered attributes of provisioned virtual machines |
FR3011413A1 (en) * | 2013-09-30 | 2015-04-03 | Orange | METHOD FOR ACCESSING A USER TO AT LEAST ONE COMMUNICATION SERVICE PROVIDED THROUGH A COMPUTER CENTER OF A CLOUD COMPUTING SYSTEM |
US9268789B1 (en) * | 2013-10-10 | 2016-02-23 | Google Inc. | System and methods for managing data location |
US9304804B2 (en) | 2013-10-14 | 2016-04-05 | Vmware, Inc. | Replicating virtual machines across different virtualization platforms |
US20150106805A1 (en) | 2013-10-15 | 2015-04-16 | Cisco Technology, Inc. | Accelerated instantiation of cloud resource |
US9634944B2 (en) | 2013-10-24 | 2017-04-25 | Dell Products, Lp | Multi-level iSCSI QoS for target differentiated data in DCB networks |
US9787586B2 (en) | 2013-10-24 | 2017-10-10 | University Of Houston System | Location-based network routing |
KR20150070676A (en) | 2013-12-17 | 2015-06-25 | 소프팅스 주식회사 | Personal Home Cloud Computer System |
US10915449B2 (en) | 2013-12-19 | 2021-02-09 | Hewlett Packard Enterprise Development Lp | Prioritizing data requests based on quality of service |
WO2015100656A1 (en) | 2013-12-31 | 2015-07-09 | 华为技术有限公司 | Method and device for implementing virtual machine communication |
US9992103B2 (en) | 2014-01-24 | 2018-06-05 | Cisco Technology, Inc. | Method for providing sticky load balancing |
US9529657B2 (en) | 2014-02-07 | 2016-12-27 | Oracle International Corporation | Techniques for generating diagnostic identifiers to trace events and identifying related diagnostic information |
US9678731B2 (en) | 2014-02-26 | 2017-06-13 | Vmware, Inc. | Methods and apparatus to generate a customized application blueprint |
US20150249709A1 (en) | 2014-02-28 | 2015-09-03 | Vmware, Inc. | Extending cloud storage with private devices |
US9722945B2 (en) | 2014-03-31 | 2017-08-01 | Microsoft Technology Licensing, Llc | Dynamically identifying target capacity when scaling cloud resources |
US9591064B2 (en) | 2014-03-31 | 2017-03-07 | Verizon Patent And Licensing Inc. | Method and apparatus for dynamic provisioning of communication services |
US9755858B2 (en) | 2014-04-15 | 2017-09-05 | Cisco Technology, Inc. | Programmable infrastructure gateway for enabling hybrid cloud services in a network environment |
US20150309908A1 (en) | 2014-04-29 | 2015-10-29 | Hewlett-Packard Development Company, L.P. | Generating an interactive visualization of metrics collected for functional entities |
US20150319063A1 (en) | 2014-04-30 | 2015-11-05 | Jive Communications, Inc. | Dynamically associating a datacenter with a network device |
US9473365B2 (en) | 2014-05-08 | 2016-10-18 | Cisco Technology, Inc. | Collaborative inter-service scheduling of logical resources in cloud platforms |
US9483378B2 (en) | 2014-05-21 | 2016-11-01 | Dynatrace Llc | Method and system for resource monitoring of large-scale, orchestrated, multi process job execution environments |
US9582254B2 (en) | 2014-05-22 | 2017-02-28 | Oracle International Corporation | Generating runtime components |
US10375024B2 (en) | 2014-06-20 | 2019-08-06 | Zscaler, Inc. | Cloud-based virtual private access systems and methods |
US9613078B2 (en) | 2014-06-26 | 2017-04-04 | Amazon Technologies, Inc. | Multi-database log with multi-item transaction support |
US10341458B2 (en) * | 2014-06-30 | 2019-07-02 | EMC IP Holding Company LLC | Predicting a sub-set of resources to be migrated to a new location based on a mobile device's interactions with resources at a first location and a predicted period of time the mobile device is to be in the new location |
US10122605B2 (en) | 2014-07-09 | 2018-11-06 | Cisco Technology, Inc | Annotation of network activity through different phases of execution |
US20160013990A1 (en) | 2014-07-09 | 2016-01-14 | Cisco Technology, Inc. | Network traffic management using heat maps with actual and planned /estimated metrics |
GB2529669B8 (en) * | 2014-08-28 | 2017-03-15 | Ibm | Storage system |
CN105446793B (en) | 2014-08-28 | 2018-08-28 | 国际商业机器公司 | The method and apparatus for migrating fictitious assets |
US9825878B2 (en) | 2014-09-26 | 2017-11-21 | Cisco Technology, Inc. | Distributed application framework for prioritizing network traffic using application priority awareness |
US9634928B2 (en) | 2014-09-29 | 2017-04-25 | Juniper Networks, Inc. | Mesh network of simple nodes with centralized control |
US10135737B2 (en) | 2014-09-30 | 2018-11-20 | Nicira, Inc. | Distributed load balancing systems |
US20160099847A1 (en) | 2014-10-02 | 2016-04-07 | Cisco Technology, Inc. | Method for non-disruptive cloud infrastructure software component deployment |
US10757170B2 (en) | 2014-10-13 | 2020-08-25 | Vmware, Inc. | Cross-cloud namespace management for multi-tenant environments |
US9558078B2 (en) | 2014-10-28 | 2017-01-31 | Microsoft Technology Licensing, Llc | Point in time database restore from storage snapshots |
CN104320342B (en) | 2014-10-29 | 2017-10-27 | 新华三技术有限公司 | Message forwarding method and device in a kind of transparent interconnection of lots of links internet |
US9871745B2 (en) | 2014-11-12 | 2018-01-16 | International Business Machines Corporation | Automatic scaling of at least one user application to external clouds |
US9602544B2 (en) | 2014-12-05 | 2017-03-21 | Viasat, Inc. | Methods and apparatus for providing a secure overlay network between clouds |
US9747249B2 (en) | 2014-12-29 | 2017-08-29 | Nicira, Inc. | Methods and systems to achieve multi-tenancy in RDMA over converged Ethernet |
US9075649B1 (en) | 2015-01-26 | 2015-07-07 | Storagecraft Technology Corporation | Exposing a proprietary image backup to a hypervisor as a disk file that is bootable by the hypervisor |
US10050862B2 (en) | 2015-02-09 | 2018-08-14 | Cisco Technology, Inc. | Distributed application framework that uses network and application awareness for placing data |
WO2016134182A1 (en) | 2015-02-18 | 2016-08-25 | Unravel Data Systems, Inc. | System and method for analyzing big data activities |
US9338595B1 (en) * | 2015-02-23 | 2016-05-10 | International Business Machines Corporation | Location-based mobile object management in a distributed cloud for enhancing access and performance |
US10708342B2 (en) | 2015-02-27 | 2020-07-07 | Cisco Technology, Inc. | Dynamic troubleshooting workspaces for cloud and network management systems |
US10037617B2 (en) | 2015-02-27 | 2018-07-31 | Cisco Technology, Inc. | Enhanced user interface systems including dynamic context selection for cloud-based networks |
US9928377B2 (en) | 2015-03-19 | 2018-03-27 | Netskope, Inc. | Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (CCS) |
US9432294B1 (en) | 2015-03-21 | 2016-08-30 | Cisco Technology, Inc. | Utilizing user-specified access control lists in conjunction with redirection and load-balancing on a port |
US9444744B1 (en) | 2015-04-04 | 2016-09-13 | Cisco Technology, Inc. | Line-rate selective load balancing of permitted network traffic |
US20170024260A1 (en) | 2015-07-21 | 2017-01-26 | Cisco Technology, Inc. | Workload migration across cloud providers and data centers |
US20170026470A1 (en) | 2015-07-22 | 2017-01-26 | Cisco Technology, Inc. | Intercloud audience and content analytics |
US9667657B2 (en) | 2015-08-04 | 2017-05-30 | AO Kaspersky Lab | System and method of utilizing a dedicated computer security service |
US20170048308A1 (en) * | 2015-08-13 | 2017-02-16 | Saad Bin Qaisar | System and Apparatus for Network Conscious Edge to Cloud Sensing, Analytics, Actuation and Virtualization |
US9781209B2 (en) | 2015-08-20 | 2017-10-03 | Intel Corporation | Techniques for routing packets between virtual machines |
US10067780B2 (en) | 2015-10-06 | 2018-09-04 | Cisco Technology, Inc. | Performance-based public cloud selection for a hybrid cloud environment |
US11005682B2 (en) | 2015-10-06 | 2021-05-11 | Cisco Technology, Inc. | Policy-driven switch overlay bypass in a hybrid cloud network environment |
US10455054B2 (en) * | 2015-10-09 | 2019-10-22 | At&T Intellectual Property I, L.P. | Cross-services application service, device and network content delivery management |
US10462136B2 (en) | 2015-10-13 | 2019-10-29 | Cisco Technology, Inc. | Hybrid cloud security groups |
US10142293B2 (en) | 2015-12-15 | 2018-11-27 | International Business Machines Corporation | Dynamically defined virtual private network tunnels in hybrid cloud environments |
CN105740084B (en) | 2016-01-27 | 2018-08-24 | 北京航空航天大学 | Consider the cloud computing system Reliability Modeling of common cause fault |
US10581982B2 (en) * | 2016-04-08 | 2020-03-03 | Facebook, Inc. | Mobility of application services in a distributed computing system |
US10129177B2 (en) | 2016-05-23 | 2018-11-13 | Cisco Technology, Inc. | Inter-cloud broker for hybrid cloud networks |
US10531318B1 (en) * | 2018-11-28 | 2020-01-07 | International Business Machines Corporation | Mobile data scheduling based on signal strength and user availability |
-
2016
- 2016-10-10 US US15/289,755 patent/US10523592B2/en active Active
-
2017
- 2017-07-28 EP EP17754529.0A patent/EP3523733A1/en not_active Withdrawn
- 2017-07-28 WO PCT/US2017/044437 patent/WO2018071086A1/en active Application Filing
- 2017-07-28 CN CN201780062108.5A patent/CN109844728B/en active Active
-
2019
- 2019-12-30 US US16/730,522 patent/US11716288B2/en active Active
-
2023
- 2023-07-10 US US18/349,815 patent/US20230379269A1/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101636967A (en) * | 2007-03-22 | 2010-01-27 | 微软公司 | The remote data access techniques that is used for portable set |
US20120214506A1 (en) * | 2011-02-22 | 2012-08-23 | Ole-Petter Skaaksrud | Systems and methods for geo-staging of sensor data through distributed global (cloud) architecture |
US20130073670A1 (en) * | 2011-09-15 | 2013-03-21 | Microsoft Corporation | Geo-Migration Of User State |
WO2013039930A2 (en) * | 2011-09-15 | 2013-03-21 | Microsoft Corporation | Geo-migration of user state |
US20130144978A1 (en) * | 2011-12-02 | 2013-06-06 | International Business Machines Corporation | Data relocation in global storage cloud environments |
CN103297492A (en) * | 2012-02-07 | 2013-09-11 | 国际商业机器公司 | Migrating data between networked computing environments |
US20160132784A1 (en) * | 2012-02-21 | 2016-05-12 | Comcast Cable Communications, Llc | Moveable storage |
CN105164990A (en) * | 2013-03-18 | 2015-12-16 | 皇家Kpn公司 | Redirecting client device from first gateway to second gateway for accessing network node function |
US20150373108A1 (en) * | 2014-06-18 | 2015-12-24 | International Business Machines Corporation | Dynamic proximity based networked storage |
Non-Patent Citations (1)
Title |
---|
秦华等: "基于OpenFlow网络的数据中心服务器负载均衡策略", 《计算机工程》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114207570A (en) * | 2019-08-07 | 2022-03-18 | 国际商业机器公司 | Techniques for identifying segments of an information space by active adaptation to an environmental context |
CN114270322A (en) * | 2019-08-28 | 2022-04-01 | 国际商业机器公司 | Data relocation management in data center networks |
US11748206B2 (en) | 2019-08-28 | 2023-09-05 | International Business Machines Corporation | Data recovery modification based on performance data exhibited by a network of data centers and data recovery requirement |
CN110929317A (en) * | 2019-10-17 | 2020-03-27 | 广联达科技股份有限公司 | Method, system and computer readable storage medium for automatically complementing user component modeling information |
CN113614692A (en) * | 2020-02-19 | 2021-11-05 | 茨特里克斯系统公司 | Migration of desktop workloads |
CN111935784A (en) * | 2020-08-12 | 2020-11-13 | 重庆邮电大学 | Content caching method based on federal learning in fog computing network |
CN111935784B (en) * | 2020-08-12 | 2022-04-22 | 重庆邮电大学 | Content caching method based on federal learning in fog computing network |
CN114296405A (en) * | 2020-09-22 | 2022-04-08 | 罗克韦尔自动化技术公司 | Implementation of serverless functionality using container orchestration systems and operating technology devices |
CN114296405B (en) * | 2020-09-22 | 2023-12-26 | 罗克韦尔自动化技术公司 | Achieving server-less functionality using container orchestration systems and operating technology devices |
CN115866047A (en) * | 2023-01-31 | 2023-03-28 | 华控清交信息科技(北京)有限公司 | Data redirection method and device in multi-party security computing and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2018071086A1 (en) | 2018-04-19 |
EP3523733A1 (en) | 2019-08-14 |
CN109844728B (en) | 2023-09-15 |
US10523592B2 (en) | 2019-12-31 |
US11716288B2 (en) | 2023-08-01 |
US20200145348A1 (en) | 2020-05-07 |
US20180102985A1 (en) | 2018-04-12 |
US20230379269A1 (en) | 2023-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109844728A (en) | Arranging system based on user information migrated users data and service | |
US11689884B2 (en) | System and method for providing data services on vehicles | |
US11443626B2 (en) | Adjusting vehicle timing in a transportation network | |
US10117055B2 (en) | System and method for providing data services on vehicles | |
US10332039B2 (en) | Intelligent travel planning | |
CN105468442B (en) | methods, systems, and media for migrating resources across clouds | |
US20180276572A1 (en) | Providing travel related content for transportation by multiple vehicles | |
CN107211341A (en) | The system, apparatus and method that distributed content is prefetched are carried out to user equipment | |
US10785297B2 (en) | Intelligent dataset migration and delivery to mobile internet of things devices using fifth-generation networks | |
US20180121878A1 (en) | Intelligent package delivery | |
US10540388B1 (en) | Location-aware intelligent data migration and delivery | |
US20200175610A1 (en) | Cognitive collaboration | |
US20180276578A1 (en) | Providing travel related content to modify travel itineraries | |
Yarkoni et al. | Quantum shuttle: traffic navigation with quantum computing | |
US20180276573A1 (en) | Providing travel related content customized for users | |
AU2016202134B2 (en) | System and method for providing data services on vehicles | |
US20210407031A1 (en) | Utilizing digital signals to intelligently monitor client device transit progress and generate dynamic public transit interfaces | |
US11075817B1 (en) | Context aware network capacity augmentation using a flying device | |
US20180276571A1 (en) | Providing travel related content by predicting travel intent | |
US20200245141A1 (en) | Privacy protection of entities in a transportation system | |
US20220383435A1 (en) | Systems and methods for modular hotel and living space orchestration | |
WO2020165886A1 (en) | Intelligent travel planning system to maximize travel experience by managing constraints and optimizing redundancy | |
Sharma et al. | Iot enabled smart tourism (iotest): Tourism service dimensions | |
US20230140057A1 (en) | Conversational user experience for multimodal travel system | |
US20230258460A1 (en) | Creating a time bounded and goal driven network for passenger guidance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |